Follow
Artem Tetskyi
Artem Tetskyi
Associate Professor of Dept. of Computer Systems, Networks and Cybersecurity
Verified email at khai.edu
Title
Cited by
Cited by
Year
Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks
O Morozova, A Nicheporuk, A Tetskyi, V Tkachov
Radioelectronic and computer systems, 145-156, 2021
262021
Neural networks based choice of tools for penetration testing of web applications
A Tetskyi, V Kharchenko, D Uzun
2018 IEEE 9th International Conference on Dependable Systems, Services and …, 2018
202018
Architecture and Model of Neural Network Based Service for Choice of the Penetration Testing Tools
A Tetskyi, V Kharchenko, D Uzun, A Nechausov
International Journal of Computing 20 (4), 513-518, 2021
82021
Method to Determine Fault-Tolerant Performance Probability of High-Survivability Computer Network based on Mobile Platform
V Tkachov, M Hunko, O Morozova, A Tetskyi, A Nicheporuk
2021 IEEE 8th International Conference on Problems of Infocommunications …, 2021
72021
CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS
АГ Тецький, ОІ Морозова
RADIOELECTRONIC AND COMPUTER SYSTEMS, 93-97, 2020
62020
Modeling and Availability Assessment of Mobile Healthcare IoT Using Tree Analysis and Queueing Theory
A Strielkina, D Uzun, V Kharchenko, A Tetskyi
Dependable IoT for Human and Industry: Modeling, Architecting …, 2018
6*2018
Analysis of the Possibilities of Unauthorized Access in Content Management Systems Using Attack Trees
A Tetskyi, V Kharchenko, D Uzun
Proc. PhD Symposium at ICTERI 2018, 14-17, 0
5*
THE METHOD OF SELECTING MEASURES TO PROTECT THE WEB APPLICATION AGAINST ATTACKS
A Tetskyi
Харківський політехнічний інститут” National Technical University “Kharkiv …, 2018
42018
Исследование методов получения содержимого базы данных с помощью SQL-инъекций
АГ Тецкий
Открытые информационные и компьютерные интегрированные технологии, 188-191, 2014
22014
Selecting Cloud Service for Healthcare Applications: From Hardware to Cloud Across Machine Learning
I Kuzlo, A Strielkina, A Tetskyi, D Uzun
2*
Applying of attack trees for estimation the probability of a successful attack of the web-application
АГ Тецкий
RADIOELECTRONIC AND COMPUTER SYSTEMS, 74-79, 2018
12018
Исследование структуры системы управления образовательным контентом MOODLE с использованием элементов реверс-инжиниринга
АГ Тецкий, ДД Узун
Открытые информационные и компьютерные интегрированные технологии, 206-210, 2014
12014
Smart home system security risk assessment
O Morozova, A Tetskyi, A Nicheporuk, D Kruvak, V Tkachov
Хмельницький національний університет, 2021
2021
АНАЛІЗ ПРОБЛЕМ І МОЖЛИВОСТЕЙ ЗАБЕЗПЕЧЕННЯ БЕЗПЕКИ WEB-ЗАСТОСУНКІВ, СТВОРЕНИХ ЗА ДОПОМОГОЮ СИСТЕМ КЕРУВАННЯ ВМІСТОМ
A Tetskyi
Системи управління, навігації та зв’язку. Збірник наукових праць 1 (53), 133-136, 2019
2019
APPLYING OF NEURAL NETWORKS FOR SELECTING THE TOOLS FOR PENETRATION TESTING OF WEB APPLICATIONS
АГ Тецкий
RADIOELECTRONIC AND COMPUTER SYSTEMS, 86-90, 2018
2018
DEPENDABLE IOT FOR HUMAN AND INDUSTRY: MODELING, ARCHITECTING, IMPLEMENTATION
A Strielkina, D Uzun, V Kharchenko, A Tetskyi, AKA Waleed, O Illiashenko, ...
Prospects 479, 502, 2018
2018
SECURE AND RESILIENT COMPUTING FOR INDUSTRY AND HUMAN DOMAINS. Techniques, tools and assurance cases for security and resilient computing
A Gordieiev, V Kharchenko, V Sklyar, A Perepelitsyn, V Kulanov, ...
2017
Исследование атаки на проникновение на систему управления контентом с помощью марковской модели
АГ Тецкий, ДД Узун
Радіоелектронні і комп’ютерні системи, 46–49-46–49, 2016
2016
Development of the universal data transfer protocol: mobile solution.
A Krepchenko, A Strielkina, A Tetskyi, D Uzun
DESSERT’2018 Committees
O Golembovska, O Hahina, M Medinskaya, A Strielkina, A Tetskyi
The system can't perform the operation now. Try again later.
Articles 1–20