Ihor Subach

Orcid: 0000-0002-9344-713X

According to our database1, Ihor Subach authored at least 11 papers between 2018 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Models of Fuzzy Identification of Cyber Incidents in Information and Communication Systems by Intelligent SIEM Systems.
Proceedings of the Selected Papers of the XXII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2022), 2022

Method of Detecting Cybersecurity Objects Based on OSINT Technology.
Proceedings of the Selected Papers of the XXII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2022), 2022

The Method of Detecting Radio Signals Using the Approximation of Spectral Function.
Proceedings of the Selected Papers of the IX International Scientific Conference "Information Technology and Implementation" (IT&I-2022), Workshop Proceedings, Kyiv, Ukraine, November 30, 2022

2021
Simulation Model of a Fuzzy Cyber Attack Detection System.
Proceedings of the Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS 2021), 2021

Taking into Account a Priori Uncertainty in the Model of Maintenance of Objects with Time Redundanc.
Proceedings of the Selected Papers of the VIII International Scientific Conference "Information Technology and Implementation" (IT&I-2021), 2021

Design Methodology of Cybersecurity Situational Center.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
Rule-oriented Method of Cyber Incidents Detection by SIEM Based on Fuzzy Logical Inference.
Proceedings of the Selected Papers of the XX International Scientific and Practical Conference "Information Technologies and Security" (ITS 2020), 2020

Criteria for Classification of Cyber-training and Analysis of Organizational and Technical Platforms for Their Conduct.
Proceedings of the Selected Papers of the 7th International Conference "Information Technology and Interactions" (IT&I-2020). Conferece Proceedings, 2020

Relaxation time in complex network.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Methodology of Rational Choice of Security Incident Management System for Building Operational Security Center.
Proceedings of the Selected Papers of the XIX International Scientific and Practical Conference "Information Technologies and Security" (ITS 2019), 2019

2018
Метод розподілу таблиць реляційної бази даних рівного об'єму та різними ймовірностями звертання до них в інформаційно-обчислювальній мережі АСУ (The Method of Distribution of Tables of a Relational Database of Equal Volume and Different Probabilities of Solving them in the Information and Computing Network of Automated Control Systems).
Proceedings of the Selected Papers of the XVIII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2018), 2018


  Loading...