Serhii Buchyk

According to our database1, Serhii Buchyk authored at least 11 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Byzantine Fault Tolerance in Distributed Systems: Advancing the Replica State Discovery Protocol v2.0.
Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, 2025

Hybrid Model for Detecting Fraudulent Domain Names.
Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, 2025

2024
Stateful Cluster Leader Failover Models and Methods Based on Replica State Discovery Protocol.
Proceedings of the Information Technology and Implementation (IT&I) Workshop: Intelligent Systems and Security (IT&I-WS 2024: ISS), Kyiv, Ukraine, November 20, 2024

Study of Properties, Applications and Software Implementation of The Digital Signature Algorithm Based on Elliptic Curves.
Proceedings of the Selected Papers of the XI International Scientific Conference "Information Technology and Implementation" (IT&I 2024). Conference Proceedings, 2024

Image-based symmetric message encryption method (short paper).
Proceedings of the Classic, 2024

Design of security protection and management systems based on game theory (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Methodology of FPGA Implementation and Performance Evaluation of Polar Coding for 5G Communications.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

2023
The Method for Determining the Degree of Suspiciousness of a Phishing Url.
Proceedings of the Selected Papers of the X International Scientific Conference "Information Technology and Implementation" (IT&I-2023). Workshop Proceedings, 2023

Managing the Security of the Critical Infrastructure Information Network.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2022
Phishing Attacks Detection.
Proceedings of the Selected Papers of the IX International Scientific Conference "Information Technology and Implementation" (IT&I-2022), Workshop Proceedings, Kyiv, Ukraine, November 30, 2022

2021
Diceware Password Generation Algorithm Modification based on Pseudo-Random Sequences.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021


  Loading...