Подписаться
Андрій Фесенко A.Fesenko
Андрій Фесенко A.Fesenko
Taras Shevchenko National University of Kyiv, Faculty of Information Technologies
Подтвержден адрес электронной почты в домене knu.ua - Главная страница
Название
Процитировано
Процитировано
Год
Cyber security European standards in business
M Iavich, S Gnatyuk, G Fesenko
Scientific and practical cyber security journal, 2019
182019
Experimental study of secure PRNG for Q-trits quantum cryptography protocols
S Gnatyuk, T Okhrimenko, O Azarenko, A Fesenko, R Berdibayev
2020 IEEE 11th International Conference on Dependable Systems, Services and …, 2020
172020
Novel certification method for quantum random number generators
M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko
International Journal of Computer Network and Information Security 13 (3), 28-38, 2021
152021
Cryptographic key exchange method for data factorial coding
ЕВ Фауре, АІ Щерба, ЄВ Васіліу, АО Фесенко
International Workshop on Cyber Hygiene (CybHyg-2019), Kyiv, Ukraine …, 2020
142020
Comparison and hybrid implementation of blowfish, twofish and rsa cryptosystems
M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ...
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019
132019
Security technique for authentication process in the cloud environment
O Oksiiuk, V Chaikovska, A Fesenko
2019 IEEE International Scientific-Practical Conference Problems of …, 2019
112019
Основні біометричні характеристики, сучасні системи та технології біометричної аутентифікації
ВА Швець, АО Фесенко
Київ НАУ, 2013
112013
Threat Hunting as a Method of Protection Against Cyber Threats.
N Lukova-Chuiko, A Fesenko, H Papirna, S Gnatyuk
IT&I, 103-113, 2020
102020
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
S Gnatyuk, V Sydorenko, A Polozhentsev, A Fesenko, N Akatayev, ...
COAPSN, 332-341, 2020
102020
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
V Sydorenko, S Gnatyuk, A Fesenko, Y Yevchenko, A Tolbatov, ...
ICTERI Workshops, 136-156, 2020
72020
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare
S Gnatyuk, R Berdibayev, A Fesenko, O Kyryliuk, A Bessalov
Cybersecurity Providing in Information and Telecommunication Systems II 2021 …, 2021
52021
Improvement of Merkle signature scheme by means of optical quantum random number generators
M Iavich, A Gagnidze, G Iashvili, T Okhrimenko, A Arakelian, A Fesenko
Advances in Computer Science for Engineering and Education III 3, 440-453, 2021
52021
ENSURING EUROPEAN CIVIL AVIATION CYBERSECURITY
S Gnatyuk, M Iavich, G Iashvili, A Fesenko
Scientific and practical cyber security journal, 2019
52019
Review of modern quantum key distribution protocols
S Gnatyuk, T Okhrimenko, S Dorozhynskyy, A Fesenko
Sci Pract Cyber Secur J 4 (1), 56-60, 2020
22020
Software Tool for Ensuring Data Integrity and Confidentiality Through the Use of Cryptographic Mechanisms.
R Aleksieieva, A Fesenko, A Dudnik, Y Zhanerke
MoMLeT+ DS, 259-273, 2023
12023
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment
M Iavich, G Iashvili, Z Avkurova, S Dorozhynskyi, A Fesenko
differences 1 (2), 2022
12022
Alternative Method of Cryptocurrency Wallets Managing.
G Omarov, D Dzhuruntayev, A Fesenko, S Umbet, S Dorozhynskyi
IT&I, 229-236, 2021
12021
Experimental Study of Information Technology for Detecting the Electronic Mass Media PR-effect based on Statistical Analysis.
O Hatyan, M Ryabyy, A Fesenko, V Kyschenko, M Bauyrzhan, A Petrov
COAPSN, 172-183, 2019
12019
Методи обробки даних для систем ідентифікації та аутентифікації на основі біометричних характеристик ока
АО Фесенко
12017
Ontological-Relational Data Store Model for a Cloud-based SIEM System Development
V Sydorenko, O Zhyharevych, R Berdybaev, A Polozhentsev, A Fesenko
2024
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20