Pavlo Skladannyi

According to our database1, Pavlo Skladannyi authored at least 32 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Methodology for Choosing a Consensus Algorithm for Blockchain Technology.
Proceedings of the Digital Economy Concepts and Technologies Workshop, 2024

Methods for Predicting Failures in a Smart Home.
Proceedings of the Digital Economy Concepts and Technologies Workshop, 2024

Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

2023
Jump-Stay Jamming Attack on Wi-Fi Systems.
Proceedings of the 18th IEEE International Conference on Computer Science and Information Technologies, 2023

Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves.
Proceedings of the Workshop on Classic, 2023

Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Formation of High School Students' Resistance to Destructive Information Influences.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2022
Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center.
Proceedings of the Selected Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things (TTSIIT 2022), 2022

Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir (short paper).
Proceedings of the Selected Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things (TTSIIT 2022), 2022

Prototyping Methodology of End-to-End Speech Analytics Software.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop MoMLeT&DS 2022, 2022

Implementation of Active Cybersecurity Education in Ukrainian Higher School.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

Modified Delta Maintainability Model of Object-Oriented Software (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

Stability Verification of Self-Organized Wireless Networks with Block Encryption.
Proceedings of The Fifth International Workshop on Computer Modeling and Intelligent Systems (CMIS-2022), 2022

Dynamic model of guarantee capacity and cyber security management in the critical automated system.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022

2021
Natural Language Technology to Ensure the Safety of Speech Information.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Formation of Requirements for the Electronic Record-Book in Guaranteed Information Systems of Distance Learning (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Decentralized Access Demarcation System Construction in Situational Center Network.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
3- and 5-Isogenies of Supersingular Edwards Curves.
CoRR, 2020

Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves.
Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, 2020

Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies.
Proceedings of the Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), 2020

Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves.
Proceedings of the Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), 2020

2019
Implementation of an Index Optimize Technology for Highly Specialized Terms based on the Phonetic Algorithm Metaphone.
CoRR, 2019

Security Rating Metrics for Distributed Wireless Systems.
Proceedings of the Modern Machine Learning Technologies, 2019

Operation System for Modern Unmanned Aerial Vehicles.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Data Mining Usage for Social Networks.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019


  Loading...