Follow
Àíäð³é Ôåñåíêî A.Fesenko
Àíäð³é Ôåñåíêî A.Fesenko
Taras Shevchenko National University of Kyiv, Faculty of Information Technologies
Verified email at knu.ua - Homepage
Title
Cited by
Cited by
Year
Cyber security European standards in business
M Iavich, S Gnatyuk, G Fesenko
Scientific and practical cyber security journal, 2019
202019
Experimental study of secure PRNG for Q-trits quantum cryptography protocols
S Gnatyuk, T Okhrimenko, O Azarenko, A Fesenko, R Berdibayev
2020 IEEE 11th International Conference on Dependable Systems, Services and …, 2020
182020
Cryptographic key exchange method for data factorial coding
Å Ôàóðå, À² Ùåðáà, ªÂ Âàñ³ë³ó, ÀÎ Ôåñåíêî
International Workshop on Cyber Hygiene (CybHyg-2019), Kyiv, Ukraine …, 2020
182020
Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems
M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ...
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019
172019
Îñíîâí³ á³îìåòðè÷í³ õàðàêòåðèñòèêè, ñó÷àñí³ ñèñòåìè òà òåõíîëî㳿 á³îìåòðè÷íî¿ àóòåíòèô³êàö³¿
ÂÀ Øâåöü, ÀÎ Ôåñåíêî
Êè¿â ÍÀÓ, 2013
162013
Novel certification method for quantum random number generators
M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko
International Journal of Computer Network and Information Security 13 (3), 28-38, 2021
152021
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
S Gnatyuk, V Sydorenko, A Polozhentsev, A Fesenko, N Akatayev, ...
COAPSN, 332-341, 2020
112020
Security technique for authentication process in the cloud environment
O Oksiiuk, V Chaikovska, A Fesenko
2019 IEEE International Scientific-Practical Conference Problems of …, 2019
112019
Threat hunting as a method of protection against cyber threats
N Lukova-Chuikoa, A Fesenkoa, H Papirnaa, S Gnatyukb
CEUR Workshop Proceedings, 103-113, 2021
102021
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare
S Gnatyuk, R Berdibayev, A Fesenko, O Kyryliuk, A Bessalov
Cybersecurity Providing in Information and Telecommunication Systems II 2021 …, 2021
82021
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
V Sydorenko, S Gnatyuk, A Fesenko, Y Yevchenko, A Tolbatov, ...
ICTERI Workshops, 136-156, 2020
82020
Improvement of Merkle signature scheme by means of optical quantum random number generators
M Iavich, A Gagnidze, G Iashvili, T Okhrimenko, A Arakelian, A Fesenko
Advances in Computer Science for Engineering and Education III 3, 440-453, 2021
52021
ENSURING EUROPEAN CIVIL AVIATION CYBERSECURITY
S Gnatyuk, M Iavich, G Iashvili, A Fesenko
Scientific and practical cyber security journal, 2019
52019
Software Tool for Ensuring Data Integrity and Confidentiality Through the Use of Cryptographic Mechanisms.
R Aleksieieva, A Fesenko, A Dudnik, Y Zhanerke
MoMLeT+ DS, 259-273, 2023
22023
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment
M Iavich, G Iashvili, Z Avkurova, S Dorozhynskyi, A Fesenko
differences 1 (2), 2022
22022
Review of modern quantum key distribution protocols
S Gnatyuk, T Okhrimenko, S Dorozhynskyy, A Fesenko
Sci Pract Cyber Secur J 4 (1), 56-60, 2020
22020
Experimental Study of Information Technology for Detecting the Electronic Mass Media PR-effect based on Statistical Analysis.
O Hatyan, M Ryabyy, A Fesenko, V Kyschenko, M Bauyrzhan, A Petrov
COAPSN, 172-183, 2019
22019
Research on data transmission technologies and information security in IoT networks
O Zhydka, M Riabyi, A Fesenko, L Kydyralina, T Okhrimenko
Proceedings of the 3rd International Workshop on Social Communication and …, 2024
12024
Alternative Method of Cryptocurrency Wallets Managing.
G Omarov, D Dzhuruntayev, A Fesenko, S Umbet, S Dorozhynskyi
IT&I, 229-236, 2021
12021
Ìåòîäè îáðîáêè äàíèõ äëÿ ñèñòåì ³äåíòèô³êàö³¿ òà àóòåíòèô³êàö³¿ íà îñíîâ³ á³îìåòðè÷íèõ õàðàêòåðèñòèê îêà
ÀÎ Ôåñåíêî
12017
The system can't perform the operation now. Try again later.
Articles 1–20