Opirskyy, Ivan
89  Ergebnisse:
Personensuche X
?
1

Development of a model of the information and analytical sy..:

Shmatko, Olexander ; Yevseiev, Serhii ; Milov, Oleksandr...
Information and controlling system; Eastern-European Journal of Enterprise Technologies.  3 (2024)  9 (129) - p. 28-36 , 2024
 
?
2

Entropy Method for Assessing the Strength of Encryption Alg..:

, In: 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA),
 
?
3

USE OF NON-FUNGIBLE TOKENS AND BLOCKCHAIN TO DEMARCATE ACCE..:

Balatska, Valeriia ; Рoberezhnyk, Vasyl ; Opirskyy, Ivan
Cybersecurity: Education, Science, Technique.  4 (2024)  24 - p. 99-114 , 2024
 
?
4

EFFECTIVENESS OF BLOCKCHAIN LOGGING AND SSO IN CYBER SECURI..:

Opirskyy, Ivan ; Petriv, Petro
Cybersecurity: Education, Science, Technique.  4 (2024)  24 - p. 50-68 , 2024
 
?
5

A model of decoy system based on dynamic attributes for cyb..:

Vasylyshyn, Sviatoslav ; Susukailo, Vitalii ; Opirskyy, Ivan..
Eastern-European Journal of Enterprise Technologies.  1 (2023)  9 (121) - p. 6-20 , 2023
 
?
6

A Method to Detect Suspicious Individuals Through Mobile De..:

, In: 2023 IEEE 5th International Conference on Advanced Information and Communication Technologies (AICT),
 
?
7

Devising a method for detecting "evil twin" attacks on IEEE..:

Banakh, Roman ; Piskozub, Andrian ; Opirskyy, Ivan
Eastern-European Journal of Enterprise Technologies.  3 (2023)  9 (123) - p. 20-32 , 2023
 
?
8

Method of assessment of frequency resolution for aircraft:

Yevseiev, Serhii ; Herasymov, Serhii ; Kuznietsov, Oleksandr...
Eastern-European Journal of Enterprise Technologies.  2 (2023)  9 (122) - p. 34-45 , 2023
 
?
9

ENSURING THE CONFIDENTIALITY OF PERSONAL DATA AND SUPPORTIN..:

Balatska, Valeriia ; Opirskyy, Ivan
Cybersecurity: Education, Science, Technique.  4 (2023)  20 - p. 6-19 , 2023
 
?
10

Development of a concept for cybersecurity metrics classifi..:

Yevseiev, Serhii ; Milov, Oleksandr ; Opirskyy, Ivan...
Eastern-European Journal of Enterprise Technologies.  4 (2022)  4 (118) - p. 6-18 , 2022
 
?
11

RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-..:

Laktionov, Illia ; Kmit, Andrii ; Opirskyy, Ivan.
Cybersecurity: Education, Science, Technique.  1 (2022)  17 - p. 91-111 , 2022
 
?
12

Development of a method for determining the indicators of m..:

Yevseiev, Serhii ; Katsalap, Vitaliy ; Mikhieiev, Yurii...
Eastern-European Journal of Enterprise Technologies.  3 (2022)  9 (117) - p. 22-35 , 2022
 
?
13

Development of a modification of the method for constructin..:

Petrivskyi, Volodymyr ; Shevchenko, Viktor ; Yevseiev, Serhii...
Eastern-European Journal of Enterprise Technologies.  1 (2022)  9(115) - p. 15-23 , 2022
 
?
14

Heuristic Method of Finding Bitsliced-description of Deriva..:

, In: 2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET),
 
?
15

RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VI..:

Dudykevych, Valery ; Opirskyy, Ivan ; Dzianyi, Nazariy..
Cybersecurity: Education, Science, Technique.  3 (2022)  15 - p. 110-123 , 2022
 
1-15