Sergiy Gnatyuk
Orcid: 0000-0003-4992-0564
According to our database1,
Sergiy Gnatyuk
authored at least 75 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
1
1
1
1
1
1
11
11
8
15
8
12
3
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Comput., 2024
Proceedings of the 3rd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2024), 2024
Proceedings of 29th International Conference Information Society and University Studies, 2024
Experimental study of the model for calculating the quantitative criteria for assessing the security level of information and communication systems of the state critical infrastructure (short paper).
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024
Analysis of modern LMS platforms in Kazakhstan: Structure, functionality, cybersecurity (short paper).
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024
Proceedings of the Classic, 2024
Proceedings of the Classic, 2024
Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024
Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper).
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024
Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
Method for managing IT incidents in critical information infrastructure facilities (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
2023
Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), 2023
Predicting Pseudo-Random and Quantum Random Number Sequences using Hybrid Deep Learning Models.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop (MoMLeT&DS 2023), 2023
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023
Real-time ML algorithms for the detection of dangerous objects in critical infrastructures.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023
ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023
Proceedings of the 13th International Conference on Dependable Systems, 2023
Proceedings of the Workshop on Classic, 2023
Dataset of Cryptographic Algorithms for UAV Image Encryption based on Artificial Neural Networks (short paper).
Proceedings of the Workshop on Classic, 2023
Studies on WSN Models for IoT-based Monitoring Systems in the Critical Infrastructure of the State.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023
Model of Information Technology for Efficient Data Processing in Cloud-based Malware Detection Systems of Critical Information Infrastructure (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023
2022
Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond.
Sensors, 2022
Method for Calculating the Criticality Level of Sectoral Information and Telecommunication Systems.
Proceedings of the Selected Papers of the IX International Scientific Conference "Information Technology and Implementation" (IT&I-2022). Conference Proceedings Kyiv, Ukraine, November 30, 2022
Information Flows Formalization for BSD Family Operating Systems Security Against Unauthorized Investigation.
Proceedings of the Information Technology for Education, Science, and Technics, 2022
Proceedings of the Information Technology for Education, Science, and Technics, 2022
Proceedings of the Information Technology for Education, Science, and Technics, 2022
The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022
Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022
2021
Proceedings of the 26th International Conference on Information Society and University Studies (IVUS 2021), 2021
Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems.
Proceedings of the Selected Papers of the VIII International Scientific Conference "Information Technology and Implementation" (IT&I-2021), 2021
Streaming Algorithm to the Decomposition of a Polyatomic Molecules Mass Spectra on the Polychlorinated Biphenyls Molecule Example.
Proceedings of the Lecture Notes in Computational Intelligence and Decision Making, 2021
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021
Proceedings of the Information and Software Technologies - 27th International Conference, 2021
Proceedings of the Information and Software Technologies - 27th International Conference, 2021
Models for early web-attacks detection and intruders identification based on fuzzy logic.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021
Distributive Training can Improve Neural Network Performance based on RL-CNN Architecture.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021
Assessing Risk of Enterprise Bankruptcy by Indicators of Financial and Economic Activity Using Bayesian Networks.
Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Studies on Practical Cryptographic Security Analysis for Block Ciphers with Random Substitutions.
Int. J. Comput., 2020
Proceedings of the Information Society and University Studies 2020, 2020
Proceedings of the Selected Papers of the 7th International Conference "Information Technology and Interactions" (IT&I-2020). Conferece Proceedings, 2020
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
Proceedings of the 16th International Conference on ICT in Education, 2020
Proceedings of the 16th International Conference on ICT in Education, 2020
Proceedings of the 9th International Conference "Information Control Systems & Technologies", 2020
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
Proceedings of the 2nd International Workshop on Control, 2020
Studies on the Disasters Criticality Assessment in Aviation Information Infrastructure.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020
2019
Proceedings of the International Conference on Information Technologies, 2019
Improved Model of Quantum Deterministic Protocol Implementation in Channel with Noise.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019
High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits.
Proceedings of the 15th International Conference on ICT in Education, 2019
Devices for Modular Multiplication of Numbers with Analysis of Two Least Significant Bits of the Multiplier.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019
Bifurcation Prediction Method for the Emergence and Development Dynamics of Information Conflicts in Cybernetic Space.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019
Experimental Identification of the Critical Information Infrastructure Objects in Aviation.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019
Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion.
Proceedings of the 3rd International Conference on Computational Linguistics and Intelligent Systems (COLINS-2019). Volume I: Main Conference, 2019
Legal Mechanism of Counteracting Information Aggression in Social Networks: from Theory to Practice.
Proceedings of the 1st International Workshop on Control, 2019
Network-centric Approach to Destructive Manipulative Influence Evaluation in Social Media.
Proceedings of the 1st International Workshop on Control, 2019
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019
Ergonomic Support for Decision-Making Management of the Chief Information Security Officer.
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019
2018
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks.
Int. J. Commun. Networks Inf. Secur., 2018
Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks.
Proceedings of the 1st International Workshop on Informatics & Data-Driven Medicine (IDDM 2018), 2018
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks.
Proceedings of the 14th International Conference on ICT in Education, 2018
Synthesis of a Quite Proof Cryptosystem with Increased Unicity Distance for Cloud Computing.
Proceedings of the 14th International Conference on ICT in Education, 2018
2016
Proceedings of the Meeting Security Challenges Through Data Analytics and Decision Support, 2016
2015
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
2010