Follow
Àíäð³é Ôåñåíêî A.Fesenko
Àíäð³é Ôåñåíêî A.Fesenko
Taras Shevchenko National University of Kyiv, Faculty of Information Technologies
Verified email at knu.ua - Homepage
Title
Cited by
Cited by
Year
Cyber security European standards in business
M Iavich, S Gnatyuk, G Fesenko
Scientific and practical cyber security journal, 2019
182019
Experimental study of secure PRNG for Q-trits quantum cryptography protocols
S Gnatyuk, T Okhrimenko, O Azarenko, A Fesenko, R Berdibayev
2020 IEEE 11th International Conference on Dependable Systems, Services and …, 2020
172020
Novel certification method for quantum random number generators
M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko
International Journal of Computer Network and Information Security 13 (3), 28-38, 2021
152021
Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems
M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ...
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019
132019
Cryptographic key exchange method for data factorial coding
Å Ôàóðå, À² Ùåðáà, ªÂ Âàñ³ë³ó, ÀÎ Ôåñåíêî
International Workshop on Cyber Hygiene (CybHyg-2019), Kyiv, Ukraine …, 2020
122020
Security technique for authentication process in the cloud environment
O Oksiiuk, V Chaikovska, A Fesenko
2019 IEEE International Scientific-Practical Conference Problems of …, 2019
112019
Threat Hunting as a Method of Protection Against Cyber Threats.
N Lukova-Chuiko, A Fesenko, H Papirna, S Gnatyuk
IT&I, 103-113, 2020
102020
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
S Gnatyuk, V Sydorenko, A Polozhentsev, A Fesenko, N Akatayev, ...
COAPSN, 332-341, 2020
102020
Îñíîâí³ á³îìåòðè÷í³ õàðàêòåðèñòèêè, ñó÷àñí³ ñèñòåìè òà òåõíîëî㳿 á³îìåòðè÷íî¿ àóòåíòèô³êàö³¿
ÂÀ Øâåöü, ÀÎ Ôåñåíêî
Êè¿â ÍÀÓ, 2013
102013
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
V Sydorenko, S Gnatyuk, A Fesenko, Y Yevchenko, A Tolbatov, ...
ICTERI Workshops, 136-156, 2020
72020
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare
S Gnatyuk, R Berdibayev, A Fesenko, O Kyryliuk, A Bessalov
Cybersecurity Providing in Information and Telecommunication Systems II 2021 …, 2021
52021
Improvement of Merkle signature scheme by means of optical quantum random number generators
M Iavich, A Gagnidze, G Iashvili, T Okhrimenko, A Arakelian, A Fesenko
Advances in Computer Science for Engineering and Education III 3, 440-453, 2021
52021
ENSURING EUROPEAN CIVIL AVIATION CYBERSECURITY
S Gnatyuk, M Iavich, G Iashvili, A Fesenko
Scientific and practical cyber security journal, 2019
52019
Review of modern quantum key distribution protocols
S Gnatyuk, T Okhrimenko, S Dorozhynskyy, A Fesenko
Sci Pract Cyber Secur J 4 (1), 56-60, 2020
22020
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment
M Iavich, G Iashvili, Z Avkurova, S Dorozhynskyi, A Fesenko
differences 1 (2), 2022
12022
Alternative Method of Cryptocurrency Wallets Managing.
G Omarov, D Dzhuruntayev, A Fesenko, S Umbet, S Dorozhynskyi
IT&I, 229-236, 2021
12021
Experimental Study of Information Technology for Detecting the Electronic Mass Media PR-effect based on Statistical Analysis.
O Hatyan, M Ryabyy, A Fesenko, V Kyschenko, M Bauyrzhan, A Petrov
COAPSN, 172-183, 2019
12019
Ìåòîäè îáðîáêè äàíèõ äëÿ ñèñòåì ³äåíòèô³êàö³¿ òà àóòåíòèô³êàö³¿ íà îñíîâ³ á³îìåòðè÷íèõ õàðàêòåðèñòèê îêà
ÀÎ Ôåñåíêî
12017
Ontological-Relational Data Store Model for a Cloud-based SIEM System Development
V Sydorenko, O Zhyharevych, R Berdybaev, A Polozhentsev, A Fesenko
2024
ÌÎÄÅ˲ ÒÀ ÌÅÒÎÄÈ ÂÈÇÍÀ×ÅÍÍß ÏÐÎÍÈÊÍÅÍÍß Â ÎÕÎÐÎÍͲ ÎÁ’ªÊÒÈ ÇÀÑÎÁÀÌÈ ÁÅÇÄÐÎÒÎÂÈÕ ÑÅÍÑÎÐÍÈÕ ÌÅÐÅÆ
 Ôåñåíêî
European Science, 161-171, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20