Ivan Opirskyy

According to our database1, Ivan Opirskyy authored at least 24 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on security as code approach for cloud-native applications based on Kubernetes cluster.
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024

Utilizing blockchain technologies for ensuring the confidentiality and security of personal data in compliance with GDPR.
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024

Pseudorandom sequence generator based on the computation of ln 2 (short paper).
Proceedings of the Classic, 2024

Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 Requirements.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Modern technologies of decentralized databases, authentication, and authorization methods.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Blockchain Application Concept in SSO Technology Context.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Blockchain for enhancing transparency and trust in government registries.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Algorithm for Assessing the Degree of Information Security Risk of a Cyber Physical System for Controlling Underground Metal Constructions.
Proceedings of The Seventh International Workshop on Computer Modeling and Intelligent Systems (CMIS-2024), 2024

Combat Drone Swarm System (CDSS) Based on Solana Blockchain Technology.
Proceedings of The Seventh International Workshop on Computer Modeling and Intelligent Systems (CMIS-2024), 2024

2023
Finding a Bit-Sliced Representation of 4×4 S-Boxes based on Typical Logic Processor Instructions.
Proceedings of the Workshop on Classic, 2023

Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms.
Proceedings of the Workshop on Classic, 2023

Research on Security Challenges in Cloud Environments and Solutions based on the "Security-as-Code" Approach.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Minimization of Bitsliced Representation of 4×4 S-Boxes based on Ternary Logic Instruction.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Developing of Blockchain Method in Message Interchange Systems.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Development of the Learning Management System Concept based on Blockchain Technology.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2022
Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001: 2013.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

2021
Effective Distribution of Tasks in Multiprocessor and Multi-Computers Distributed Homogeneous Systems.
Int. J. Comput., 2021

Comparative Analysis of the Efficiency of Modern Fake Detection Algorithms in Scope of Information Warfare.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Honeypot Security Efficiency versus Deception Solution (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Cybercrimes Investigation via Honeypots in Cloud Environments (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Formation of Requirements for the Electronic Record-Book in Guaranteed Information Systems of Distance Learning (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

SDR Receivers as a New Challenge to Cybersecurity Wireless Technology.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
Analysis of the use of software baits as a means of ensuring information security.
Proceedings of the IEEE 15th International Conference on Computer Sciences and Information Technologies, 2020

Analysis of the attack vectors used by threat actors during the pandemic.
Proceedings of the IEEE 15th International Conference on Computer Sciences and Information Technologies, 2020


  Loading...