Sergiy Gnatyuk

Orcid: 0000-0003-4992-0564

According to our database1, Sergiy Gnatyuk authored at least 63 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

2023
Modern Challenges of the Activities of Document and Information Institutions.
Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), 2023

Predicting Pseudo-Random and Quantum Random Number Sequences using Hybrid Deep Learning Models.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop (MoMLeT&DS 2023), 2023

Improved Method for Penetration Testing of Web Applications.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

Real-time ML algorithms for the detection of dangerous objects in critical infrastructures.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Novel Cyber Incident Management System for 5G-based Critical Infrastructures.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Study on the Evaluating the Degree of Investment Attractiveness of It-Projects.
Proceedings of the 13th International Conference on Dependable Systems, 2023

Modular Matrix Multiplication for Cryptographic Conversions (short paper).
Proceedings of the Workshop on Classic, 2023

Dataset of Cryptographic Algorithms for UAV Image Encryption based on Artificial Neural Networks (short paper).
Proceedings of the Workshop on Classic, 2023

Studies on WSN Models for IoT-based Monitoring Systems in the Critical Infrastructure of the State.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Model of Information Technology for Efficient Data Processing in Cloud-based Malware Detection Systems of Critical Information Infrastructure (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

2022
Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond.
Sensors, 2022

Method for Calculating the Criticality Level of Sectoral Information and Telecommunication Systems.
Proceedings of the Selected Papers of the IX International Scientific Conference "Information Technology and Implementation" (IT&I-2022). Conference Proceedings Kyiv, Ukraine, November 30, 2022

Information Flows Formalization for BSD Family Operating Systems Security Against Unauthorized Investigation.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

Developing Security Recommender System Using Content-Based Filtering Mechanisms.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

5G Security Function and Its Testing Environment.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

Ways of spinning implementation in complex natural language sentences.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022

Conceptual basics of semantic comparison texts in social networks.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022

2021
Post-Quantum Digital Signature Scheme with BB84 Protocol.
Proceedings of the 26th International Conference on Information Society and University Studies (IVUS 2021), 2021

Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems.
Proceedings of the Selected Papers of the VIII International Scientific Conference "Information Technology and Implementation" (IT&I-2021), 2021

Simulated Test Laboratory for 5G Test Patterns.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Efficient and Secure Digital Signature Scheme for Post Quantum Epoch.
Proceedings of the Information and Software Technologies - 27th International Conference, 2021

Cloud-Based Cyber Incidents Response System and Software Tools.
Proceedings of the Information and Software Technologies - 27th International Conference, 2021

Models for early web-attacks detection and intruders identification based on fuzzy logic.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

Distributive Training can Improve Neural Network Performance based on RL-CNN Architecture.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Modern Types of Databases for SIEM System Development.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Assessing Risk of Enterprise Bankruptcy by Indicators of Financial and Economic Activity Using Bayesian Networks.
Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), 2021

The Novel System of Attacks Detection in 5G.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Increasing Usability of TLS Certificate Generation Process Using Secure Design.
Proceedings of the Information Society and University Studies 2020, 2020

Threat Hunting as a Method of Protection Against Cyber Threats.
Proceedings of the Selected Papers of the 7th International Conference "Information Technology and Interactions" (IT&I-2020). Conferece Proceedings, 2020

Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
Proceedings of the 16th International Conference on ICT in Education, 2020

Improved Secure Stream Cipher for Cloud Computing.
Proceedings of the 16th International Conference on ICT in Education, 2020

Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher.
Proceedings of the 9th International Conference "Information Control Systems & Technologies", 2020

Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
Proceedings of the 2nd International Workshop on Control, 2020

Studies on the Disasters Criticality Assessment in Aviation Information Infrastructure.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020

2019
Lattice based merkle.
Proceedings of the International Conference on Information Technologies, 2019

Improved Model of Quantum Deterministic Protocol Implementation in Channel with Noise.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits.
Proceedings of the 15th International Conference on ICT in Education, 2019

Devices for Modular Multiplication of Numbers with Analysis of Two Least Significant Bits of the Multiplier.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Bifurcation Prediction Method for the Emergence and Development Dynamics of Information Conflicts in Cybernetic Space.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

System for Monitoring the Connection of USB Devices for Cybersecurity Auditing.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Experimental Identification of the Critical Information Infrastructure Objects in Aviation.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion.
Proceedings of the 3rd International Conference on Computational Linguistics and Intelligent Systems (COLINS-2019). Volume I: Main Conference, 2019

Legal Mechanism of Counteracting Information Aggression in Social Networks: from Theory to Practice.
Proceedings of the 1st International Workshop on Control, 2019

Network-centric Approach to Destructive Manipulative Influence Evaluation in Social Media.
Proceedings of the 1st International Workshop on Control, 2019

Communication in Civil Aviation: Linguistic Analysis for Educational Purposes.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Ergonomic Support for Decision-Making Management of the Chief Information Security Officer.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

2018
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks.
Int. J. Commun. Networks Inf. Secur., 2018

Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks.
Proceedings of the 1st International Workshop on Informatics & Data-Driven Medicine (IDDM 2018), 2018

High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks.
Proceedings of the 14th International Conference on ICT in Education, 2018

Synthesis of a Quite Proof Cryptosystem with Increased Unicity Distance for Cloud Computing.
Proceedings of the 14th International Conference on ICT in Education, 2018

2016
Critical Aviation Information Systems Cybersecurity.
Proceedings of the Meeting Security Challenges Through Data Analytics and Decision Support, 2016

2015
Efficiency increasing method for quantum secure direct communication protocols.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2010
Modern Quantum Technologies of Information Security
CoRR, 2010


  Loading...