Maksim Iavich

Orcid: 0000-0002-3109-7971

According to our database1, Maksim Iavich authored at least 59 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.
Cryptogr., September, 2024

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.
Cryptogr., June, 2024

Enhanced detection of low-rate DDoS attack patterns using machine learning models.
J. Netw. Comput. Appl., 2024

Signature-based manual dating vs. neural network automation (short paper).
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024

Predicting pseudo-random number generator output with sequential analysis.
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024

Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

2023
A Post-Quantum Digital Signature Using Verkle Trees and Lattices.
Symmetry, December, 2023

Linear Layer Architecture Based on Cyclic Shift and XOR.
Symmetry, August, 2023

Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks.
Symmetry, 2023

An Extended Review Concerning the Relevance of Deep Learning and Privacy Techniques for Data-Driven Soft Sensors.
Sensors, 2023

Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers.
Big Data Cogn. Comput., 2023

Utilizing the «MouseJack» Vulnerability in Physical Assessments.
Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023), 2023

Digital Signature Design Using Verkle Tree.
Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023), 2023

Enhancing Cyber Intelligence Capabilities through Process Automation: Advantages and Opportunities.
Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023), 2023

High-Band Related Threats in 5G Network.
Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023), 2023

ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Correlation of Bitcoin Price and S&P 500 Company Index (short paper).
Proceedings of the Workshop on Classic, 2023

Verkle Tree-based Post-Quantum Digital Signature Scheme using Stateless Updatable Vector Commitment.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Secure Encrypted Connection on Georgian Website (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

A Post-quantum Cryptosystem with a Hybrid Quantum Random Number Generator.
Proceedings of the Advanced Information Networking and Applications, 2023

Device Tracking Threats in 5G Network.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Technological Processes of Working with Documented Information in the Organization as an Indicator of Corporate Information Subculture.
Proceedings of the 1st International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA-2022), 2022

Developing Security Recommender System Using Content-Based Filtering Mechanisms.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

5G Security Function and Its Testing Environment.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

Global processes of economy's sustainable development, information society, systems and technologies.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022

Real Time Self-developing Cybersecurity Function for 5G.
Proceedings of the Advanced Information Networking and Applications, 2022

Enhanced Autonomous Driving Through Improved 3D Objects Detection.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Post-Quantum Digital Signature Scheme with BB84 Protocol.
Proceedings of the 26th International Conference on Information Society and University Studies (IVUS 2021), 2021

Novel Intrusion Detection System for 5G.
Proceedings of the 26th International Conference on Information Society and University Studies (IVUS 2021), 2021

Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems.
Proceedings of the 26th International Conference on Information Society and University Studies (IVUS 2021), 2021

Novel Architecture of 5G Network.
Proceedings of the 26th International Conference on Information Society and University Studies (IVUS 2021), 2021

Simulated Test Laboratory for 5G Test Patterns.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Efficient and Secure Digital Signature Scheme for Post Quantum Epoch.
Proceedings of the Information and Software Technologies - 27th International Conference, 2021

Cloud-Based Cyber Incidents Response System and Software Tools.
Proceedings of the Information and Software Technologies - 27th International Conference, 2021

Advanced Data Security and Privacy Ensuring Methods in 5G Era.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

The Novel System of Attacks Detection in 5G.
Proceedings of the Advanced Information Networking and Applications, 2021

A Real-Time Intrusion Detection System for Software Defined 5G Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Post-Quantum Digital Signatures with Attenuated Pulse Generator.
Proceedings of the Information Society and University Studies 2020, 2020

Increasing Usability of TLS Certificate Generation Process Using Secure Design.
Proceedings of the Information Society and University Studies 2020, 2020

Mathematical Model Building for COVID-19 Diseases Data in European Countries.
Proceedings of the 3rd International Conference on Informatics & Data-Driven Medicine, Växjö, Sweden, November 19, 2020

Improved Secure Stream Cipher for Cloud Computing.
Proceedings of the 16th International Conference on ICT in Education, 2020

Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher.
Proceedings of the 9th International Conference "Information Control Systems & Technologies", 2020

Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems.
Proceedings of the IEEE East-West Design & Test Symposium, 2020

Combined System of Phase Synchronization with Increased Astatism order in Frequency Monitoring Mode.
Proceedings of the 2nd International Workshop on Control, 2020

Analysis of the Essence of Social Networks as a Tool for Mediatization of the Historical and Cultural Heritage of Museums.
Proceedings of the 2nd International Workshop on Control, 2020

2019
Generation of high order primitive matrix elements for post-quantum key exchange protocol.
Proceedings of the International Conference on Information Technologies, 2019

Public-Key hybrid cryptosystem based on Blowfish and RSA.
Proceedings of the International Conference on Information Technologies, 2019

Lattice based merkle.
Proceedings of the International Conference on Information Technologies, 2019

High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits.
Proceedings of the 15th International Conference on ICT in Education, 2019

Informational Technology for the Improvement of Flight Zone Security.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Improved Gentry's Fully Homomorphic Encryption Scheme: Design, Implementation and Performance Evaluation.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Improvement of Implementation of Merkle Crypto System.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Increasing the Accuracy of the Information Load Annual Growth Evaluation on the Internet of Things.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019

2018
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks.
Proceedings of the 14th International Conference on ICT in Education, 2018


  Loading...