Andriy Fesenko

According to our database1, Andriy Fesenko authored at least 15 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Ontological-Relational Data Store Model for a Cloud-based SIEM System Development.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

2023
Software Tool for Ensuring Data Integrity and Confidentiality Through the Use of Cryptographic Mechanisms.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop (MoMLeT&DS 2023), 2023

Image Recognition Model Based on a Vector of Uncorrelated Features.
Proceedings of the Selected Papers of the X International Scientific Conference "Information Technology and Implementation" (IT&I-2023). Workshop Proceedings, 2023

2021
Information Security of Printing Organizations.
Proceedings of the Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS 2021), 2021

Alternative Method of Cryptocurrency Wallets Managing.
Proceedings of the Selected Papers of the VIII International Scientific Conference "Information Technology and Implementation" (IT&I-2021). Conference Proceedings, 2021

Passive Eavesdropping Attack of Several Intruders on Deterministic Protocol with Pairs of Entangled Qubits.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
Threat Hunting as a Method of Protection Against Cyber Threats.
Proceedings of the Selected Papers of the 7th International Conference "Information Technology and Interactions" (IT&I-2020). Conferece Proceedings, 2020

Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
Proceedings of the 16th International Conference on ICT in Education, 2020

Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
Proceedings of the 2nd International Workshop on Control, 2020

2019
Cryptographic Key Exchange Method for Data Factorial Coding.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Experimental Study of Information Technology for Detecting the Electronic Mass Media PR-effect based on Statistical Analysis.
Proceedings of the 1st International Workshop on Control, 2019

Quality of Service Optimization in Delay-Tolerant Networks through Cross-Layer Organization of Delivery Routes.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019


  Loading...