Ivan Opirskyy

According to our database1, Ivan Opirskyy authored at least 18 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 Requirements.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Blockchain Application Concept in SSO Technology Context.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Algorithm for Assessing the Degree of Information Security Risk of a Cyber Physical System for Controlling Underground Metal Constructions.
Proceedings of The Seventh International Workshop on Computer Modeling and Intelligent Systems (CMIS-2024), 2024

Combat Drone Swarm System (CDSS) Based on Solana Blockchain Technology.
Proceedings of The Seventh International Workshop on Computer Modeling and Intelligent Systems (CMIS-2024), 2024

2023
Finding a Bit-Sliced Representation of 4×4 S-Boxes based on Typical Logic Processor Instructions.
Proceedings of the Workshop on Classic, 2023

Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms.
Proceedings of the Workshop on Classic, 2023

Research on Security Challenges in Cloud Environments and Solutions based on the "Security-as-Code" Approach.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Minimization of Bitsliced Representation of 4×4 S-Boxes based on Ternary Logic Instruction.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Developing of Blockchain Method in Message Interchange Systems.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Development of the Learning Management System Concept based on Blockchain Technology.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2022
Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001: 2013.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

2021
Comparative Analysis of the Efficiency of Modern Fake Detection Algorithms in Scope of Information Warfare.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Honeypot Security Efficiency versus Deception Solution (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Cybercrimes Investigation via Honeypots in Cloud Environments (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Formation of Requirements for the Electronic Record-Book in Guaranteed Information Systems of Distance Learning (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

SDR Receivers as a New Challenge to Cybersecurity Wireless Technology.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
Analysis of the use of software baits as a means of ensuring information security.
Proceedings of the IEEE 15th International Conference on Computer Sciences and Information Technologies, 2020

Analysis of the attack vectors used by threat actors during the pandemic.
Proceedings of the IEEE 15th International Conference on Computer Sciences and Information Technologies, 2020


  Loading...