Cyber security European standards in business M Iavich, S Gnatyuk, G Fesenko Scientific and practical cyber security journal, 2019 | 20 | 2019 |
Experimental study of secure PRNG for Q-trits quantum cryptography protocols S Gnatyuk, T Okhrimenko, O Azarenko, A Fesenko, R Berdibayev 2020 IEEE 11th International Conference on Dependable Systems, Services and …, 2020 | 18 | 2020 |
Cryptographic key exchange method for data factorial coding Å Ôàóðå, À² Ùåðáà, ªÂ Âàñ³ë³ó, ÀÎ Ôåñåíêî International Workshop on Cyber Hygiene (CybHyg-2019), Kyiv, Ukraine …, 2020 | 18 | 2020 |
Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ... 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019 | 17 | 2019 |
Îñíîâí³ á³îìåòðè÷í³ õàðàêòåðèñòèêè, ñó÷àñí³ ñèñòåìè òà òåõíîëî㳿 á³îìåòðè÷íî¿ àóòåíòèô³êàö³¿ ÂÀ Øâåöü, ÀÎ Ôåñåíêî Êè¿â ÍÀÓ, 2013 | 16 | 2013 |
Novel certification method for quantum random number generators M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko International Journal of Computer Network and Information Security 13 (3), 28-38, 2021 | 15 | 2021 |
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State. S Gnatyuk, V Sydorenko, A Polozhentsev, A Fesenko, N Akatayev, ... COAPSN, 332-341, 2020 | 11 | 2020 |
Security technique for authentication process in the cloud environment O Oksiiuk, V Chaikovska, A Fesenko 2019 IEEE International Scientific-Practical Conference Problems of …, 2019 | 11 | 2019 |
Threat hunting as a method of protection against cyber threats N Lukova-Chuikoa, A Fesenkoa, H Papirnaa, S Gnatyukb CEUR Workshop Proceedings, 103-113, 2021 | 10 | 2021 |
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare S Gnatyuk, R Berdibayev, A Fesenko, O Kyryliuk, A Bessalov Cybersecurity Providing in Information and Telecommunication Systems II 2021 …, 2021 | 8 | 2021 |
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation. V Sydorenko, S Gnatyuk, A Fesenko, Y Yevchenko, A Tolbatov, ... ICTERI Workshops, 136-156, 2020 | 8 | 2020 |
Improvement of Merkle signature scheme by means of optical quantum random number generators M Iavich, A Gagnidze, G Iashvili, T Okhrimenko, A Arakelian, A Fesenko Advances in Computer Science for Engineering and Education III 3, 440-453, 2021 | 5 | 2021 |
ENSURING EUROPEAN CIVIL AVIATION CYBERSECURITY S Gnatyuk, M Iavich, G Iashvili, A Fesenko Scientific and practical cyber security journal, 2019 | 5 | 2019 |
Software Tool for Ensuring Data Integrity and Confidentiality Through the Use of Cryptographic Mechanisms. R Aleksieieva, A Fesenko, A Dudnik, Y Zhanerke MoMLeT+ DS, 259-273, 2023 | 2 | 2023 |
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment M Iavich, G Iashvili, Z Avkurova, S Dorozhynskyi, A Fesenko differences 1 (2), 2022 | 2 | 2022 |
Review of modern quantum key distribution protocols S Gnatyuk, T Okhrimenko, S Dorozhynskyy, A Fesenko Sci Pract Cyber Secur J 4 (1), 56-60, 2020 | 2 | 2020 |
Experimental Study of Information Technology for Detecting the Electronic Mass Media PR-effect based on Statistical Analysis. O Hatyan, M Ryabyy, A Fesenko, V Kyschenko, M Bauyrzhan, A Petrov COAPSN, 172-183, 2019 | 2 | 2019 |
Research on data transmission technologies and information security in IoT networks O Zhydka, M Riabyi, A Fesenko, L Kydyralina, T Okhrimenko Proceedings of the 3rd International Workshop on Social Communication and …, 2024 | 1 | 2024 |
Alternative Method of Cryptocurrency Wallets Managing. G Omarov, D Dzhuruntayev, A Fesenko, S Umbet, S Dorozhynskyi IT&I, 229-236, 2021 | 1 | 2021 |
Ìåòîäè îáðîáêè äàíèõ äëÿ ñèñòåì ³äåíòèô³êàö³¿ òà àóòåíòèô³êàö³¿ íà îñíîâ³ á³îìåòðè÷íèõ õàðàêòåðèñòèê îêà ÀÎ Ôåñåíêî | 1 | 2017 |