Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks O Morozova, A Nicheporuk, A Tetskyi, V Tkachov Radioelectronic and computer systems, 145-156, 2021 | 26 | 2021 |
Neural networks based choice of tools for penetration testing of web applications A Tetskyi, V Kharchenko, D Uzun 2018 IEEE 9th International Conference on Dependable Systems, Services and …, 2018 | 20 | 2018 |
Architecture and Model of Neural Network Based Service for Choice of the Penetration Testing Tools A Tetskyi, V Kharchenko, D Uzun, A Nechausov International Journal of Computing 20 (4), 513-518, 2021 | 8 | 2021 |
Method to Determine Fault-Tolerant Performance Probability of High-Survivability Computer Network based on Mobile Platform V Tkachov, M Hunko, O Morozova, A Tetskyi, A Nicheporuk 2021 IEEE 8th International Conference on Problems of Infocommunications …, 2021 | 7 | 2021 |
CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS АГ Тецький, ОІ Морозова RADIOELECTRONIC AND COMPUTER SYSTEMS, 93-97, 2020 | 6 | 2020 |
Modeling and Availability Assessment of Mobile Healthcare IoT Using Tree Analysis and Queueing Theory A Strielkina, D Uzun, V Kharchenko, A Tetskyi Dependable IoT for Human and Industry: Modeling, Architecting …, 2018 | 6* | 2018 |
Analysis of the Possibilities of Unauthorized Access in Content Management Systems Using Attack Trees A Tetskyi, V Kharchenko, D Uzun Proc. PhD Symposium at ICTERI 2018, 14-17, 0 | 5* | |
THE METHOD OF SELECTING MEASURES TO PROTECT THE WEB APPLICATION AGAINST ATTACKS A Tetskyi Харківський політехнічний інститут” National Technical University “Kharkiv …, 2018 | 4 | 2018 |
Исследование методов получения содержимого базы данных с помощью SQL-инъекций АГ Тецкий Открытые информационные и компьютерные интегрированные технологии, 188-191, 2014 | 2 | 2014 |
Selecting Cloud Service for Healthcare Applications: From Hardware to Cloud Across Machine Learning I Kuzlo, A Strielkina, A Tetskyi, D Uzun | 2* | |
Applying of attack trees for estimation the probability of a successful attack of the web-application АГ Тецкий RADIOELECTRONIC AND COMPUTER SYSTEMS, 74-79, 2018 | 1 | 2018 |
Исследование структуры системы управления образовательным контентом MOODLE с использованием элементов реверс-инжиниринга АГ Тецкий, ДД Узун Открытые информационные и компьютерные интегрированные технологии, 206-210, 2014 | 1 | 2014 |
Smart home system security risk assessment O Morozova, A Tetskyi, A Nicheporuk, D Kruvak, V Tkachov Хмельницький національний університет, 2021 | | 2021 |
АНАЛІЗ ПРОБЛЕМ І МОЖЛИВОСТЕЙ ЗАБЕЗПЕЧЕННЯ БЕЗПЕКИ WEB-ЗАСТОСУНКІВ, СТВОРЕНИХ ЗА ДОПОМОГОЮ СИСТЕМ КЕРУВАННЯ ВМІСТОМ A Tetskyi Системи управління, навігації та зв’язку. Збірник наукових праць 1 (53), 133-136, 2019 | | 2019 |
APPLYING OF NEURAL NETWORKS FOR SELECTING THE TOOLS FOR PENETRATION TESTING OF WEB APPLICATIONS АГ Тецкий RADIOELECTRONIC AND COMPUTER SYSTEMS, 86-90, 2018 | | 2018 |
DEPENDABLE IOT FOR HUMAN AND INDUSTRY: MODELING, ARCHITECTING, IMPLEMENTATION A Strielkina, D Uzun, V Kharchenko, A Tetskyi, AKA Waleed, O Illiashenko, ... Prospects 479, 502, 2018 | | 2018 |
SECURE AND RESILIENT COMPUTING FOR INDUSTRY AND HUMAN DOMAINS. Techniques, tools and assurance cases for security and resilient computing A Gordieiev, V Kharchenko, V Sklyar, A Perepelitsyn, V Kulanov, ... | | 2017 |
Исследование атаки на проникновение на систему управления контентом с помощью марковской модели АГ Тецкий, ДД Узун Радіоелектронні і комп’ютерні системи, 46–49-46–49, 2016 | | 2016 |
Development of the universal data transfer protocol: mobile solution. A Krepchenko, A Strielkina, A Tetskyi, D Uzun | | |
DESSERT’2018 Committees O Golembovska, O Hahina, M Medinskaya, A Strielkina, A Tetskyi | | |