Method for efficiency increasing of distributed classification of the images based on the proactive parallel computing approach V Mukhin, A Volokyta, Y Heriatovych, P Rehida Advances in Electrical and Computer Engineering 18 (2), 117-122, 2018 | 23 | 2018 |
Routing method based on the excess code for fault tolerant clusters with InfiniBand G Olexandr, P Rehida, A Volokyta, H Loutskii, VD Thinh Advances in Computer Science for Engineering and Education II, 335-345, 2020 | 16 | 2020 |
Increasing the fault tolerance of distributed systems for the Hyper de Bruijn topology with excess code H Loutskii, A Volokyta, P Rehida, O Honcharenko, B Ivanishchev, ... 2019 IEEE International Conference on Advanced Trends in Information Theory …, 2019 | 13 | 2019 |
Using excess code to design fault-tolerant topologies H Loutskii, A Volokyta, P Rehida, O Gonchareno Технічні науки та технології, 134-144, 2019 | 12 | 2019 |
Method for synthesis scalable fault-tolerant multi-level topological organizations based on excess code H Loutskii, A Volokyta, P Rehida, O Honcharenko, VD Thinh Advances in Computer Science for Engineering and Education III 3, 350-362, 2021 | 5 | 2021 |
Topology synthesis method based on excess de bruijn and dragonfly H Loutskii, A Volokyta, P Rehida, A Kaplunov, B Ivanishchev, ... Advances in Computer Science for Engineering and Education IV, 315-325, 2021 | 4 | 2021 |
Thematic texts generation issues based on recurrent neural networks and word2vec V Fomenko, H Loutskii, P Rehida, A Volokyta Технічні науки та технології, 110-115, 2017 | 3 | 2017 |
Development of real time method of detecting attacks based on artificial intelligence H Loutskii, A Volokyta, O Yakushev, P Rehida, VD Thinh Технологический аудит и резервы производства 3 (1 (29)), 40-46, 2016 | 3 | 2016 |
Request balancing method for increasing their processing efficiency with information replication in a distributed data storage system І Бояршин, А Дорошенко, П Регіда Технічні науки та технології, 75-82, 2021 | 2 | 2021 |
The programming language for embedded real-time devices with reducing errors and without reducing the performance of programs O Shmalko, P Rehida, A Volokyta, H Loutskii, VD Thinh National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic …, 2018 | 2 | 2018 |
Extended DragonDeBrujin topology synthesis method A Volokyta, H Loutskii, P Rehida, A Kaplunov, B Ivanishchev, ... International Journal of Computer Network and Information Security 12 (6), 23, 2022 | 1 | 2022 |
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques P Rehida, G Markowsky, A Sachenko, O Savenko 2023 13th International Conference on Dependable Systems, Services and …, 2023 | | 2023 |
Malware Detection Tool Based on Emulator State Analysis P Rehida, O Savenko, A Kashtalian, A Sachenko 2023 IEEE 12th International Conference on Intelligent Data Acquisition and …, 2023 | | 2023 |
Centralized distributed system for cyberattack detection in corporate network based on multifractal analysis. A Nicheporuk, S Tabenskyi, P Rehida, O Savenko, A Nicheporuk IntelITSIS, 421-431, 2022 | | 2022 |
REVIEW OF METODS OF ENVIRONMENT GENERATION IN COMPUTER GAMES O Sukhobrus, P Rehida The International Conference on Security, Fault Tolerance, Intelligence, 78-81, 2020 | | 2020 |
ANALYSIS OF DATA BALANCING PROBLEMS IN DISTRIBUTED DATA STORAGES B Ivanishchev, P Rehida, A Kaplunov, O Honcharenko The International Conference on Security, Fault Tolerance, Intelligence, 75-77, 2020 | | 2020 |
SECURITY ISSUES IN COLLECTIVE COMPUTING P Rehida, A Kaplunov, B Ivanishchev, O Honcharenko The International Conference on Security, Fault Tolerance, Intelligence, 70-74, 2020 | | 2020 |
AUTOMATION OF THE PROCESSING OF CERTIFICATES OF ENTRANTS THROUGH COMPUTER VISION VY Bandurin, P Rehida, V Steshyn, A Boldak, A Volokyta The International Conference on Security, Fault Tolerance, Intelligence, 139-143, 2019 | | 2019 |
APPLICATIONS OF SEQUENCE-TO-SEQUENCE AUTOENCODER NETWORKS IN REQUEST ANOMALY DETECTION I Aksyonenko, P Rehida The International Conference on Security, Fault Tolerance, Intelligence, 66-71, 2019 | | 2019 |
Розробка способу виявлення атак в реальному часі на основі обчислювального інтелекту ГМ Луцький, АМ Волокита, ОЮ Якушев, ПГ Регіда, ВД Тхінь Technology Audit & Production Reserves 3, 2016 | | 2016 |