Viktoriia Sydorenko

According to our database1, Viktoriia Sydorenko authored at least 11 papers between 2019 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Ukraine on the Road to the European Digital Market: Status and Tools for Implementing the European Digital Economy and Society Index in Ukraine.
Proceedings of the 1st International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA-2022), 2022

The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

2021
Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems.
Proceedings of the Selected Papers of the VIII International Scientific Conference "Information Technology and Implementation" (IT&I-2021), 2021

2020
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
Proceedings of the 16th International Conference on ICT in Education, 2020

Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
Proceedings of the 2nd International Workshop on Control, 2020

Studies on the Disasters Criticality Assessment in Aviation Information Infrastructure.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020

2019
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Polynomials Multiplier under Irreducible Polynomial Module for High-Performance Cryptographic Hardware Tools.
Proceedings of the 15th International Conference on ICT in Education, 2019

Experimental Identification of the Critical Information Infrastructure Objects in Aviation.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion.
Proceedings of the 3rd International Conference on Computational Linguistics and Intelligent Systems (COLINS-2019). Volume I: Main Conference, 2019


  Loading...