Sergiy Lysenko

Orcid: 0000-0001-7243-8747

According to our database1, Sergiy Lysenko authored at least 46 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Method for identifying cyberattacks based on the use of social engineering over the phone.
Proceedings of the 5th International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2024

Methods of improving security and resilience of VR systems' architecture.
Proceedings of the 5th International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2024

Method of optimizing delay in IoT system using fog calculations.
Proceedings of the 1st International Workshop on Intelligent & CyberPhysical Systems (ICyberPhyS 2024), 2024

2023
Distributed Discrete Malware Detection Systems Based on Partial Centralization and Self-Organization.
Int. J. Comput., 2023

Blockchain-based Deep Learning Algorithm for Detecting Malware.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

Information Technology for Predicting the Course of Climacteric Syndrome.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

Malware Detection By Distributed Systems with Partial Centralization.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Social Engineering Attacks Detection Approach.
Proceedings of the 13th International Conference on Dependable Systems, 2023

Challenges Towards VR Technology: VR Architecture Optimization.
Proceedings of the 13th International Conference on Dependable Systems, 2023

Method for Detecting Steganographic Changes in Images Using Machine Learning.
Proceedings of the 13th International Conference on Dependable Systems, 2023

2022
IoT Multi-Vector Cyberattack Detection Based on Machine Learning Algorithms: Traffic Features Analysis, Experiments, and Efficiency.
Algorithms, 2022

Botnet Detection Approach Based on DNS.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

Machine Learning Based Techniques for Cyberattacks Detection in the Internet of Things Infrastructure.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

IoT Cyberattack Detection Approach Based on Energy Consumption Analysis.
Proceedings of the 12th International Conference on Dependable Systems, 2022

2021
Resilient Computer Systems Development for Cyberattacks Resistance.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

Technique for IoT Cyberattacks Detection Based on the Energy Consumption Analysis.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

Detection DNS Tunneling Botnets.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2020
Botnet Detection Approach based on the Distributed Systems.
Int. J. Comput., 2020

Strategic priorities of innovation and investment development of the Ukraine's economy industrial sector.
Proceedings of the Selected Papers of the Special Edition of International Conference on Monitoring, 2020

Assessment of bank's financial security levels based on a comprehensive index using information technology.
Proceedings of the Selected Papers of the Special Edition of International Conference on Monitoring, 2020

Spyware Detection Technique Based on Reinforcement Learning.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

Technique for IoT Cyberattacks Detection Based on DNS Traffic Analysis.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

Technique for Cyberattacks Detection Based on DNS Traffic Analysis.
Proceedings of the 16th International Conference on ICT in Education, 2020

A Cyberattacks Detection Technique Based on Evolutionary Algorithms.
Proceedings of the 11th IEEE International Conference on Dependable Systems, 2020

Risks of Loss of Personal Data in the Process of Sending and Printing Documents.
Proceedings of the 1st International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2020) co-located with XX International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2020), 2020

2019
Botnet Detection Approach for the Distributed Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Dynamic Signature-based Malware Detection Technique Based on API Call Tracing.
Proceedings of the 15th International Conference on ICT in Education, 2019

BotGRABBER: SVM-Based Self-Adaptive System for the Network Resilience Against the Botnets' Cyberattacks.
Proceedings of the Computer Networks - 26th International Conference, 2019

SVM-based Technique for Mobile Malware Detection.
Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019), 2019

2018
The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
Proceedings of the 14th International Conference on ICT in Education, 2018

DDoS Botnet Detection Technique Based on the Use of the Semi-Supervised Fuzzy c-Means Clustering.
Proceedings of the 14th International Conference on ICT in Education, 2018

Self-adaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks.
Proceedings of the Computer Networks - 25th International Conference, 2018

2017
Approach for the unknown metamorphic virus detection.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Metamorphic Viruses' Detection Technique Based on the Equivalent Functional Block Search.
Proceedings of the 13th International Conference on ICT in Education, 2017

Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
Metamorphic Viruses Detection Technique Based on the the Modified Emulators.
Proceedings of the 12th International Conference on ICT in Education, 2016

Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
DNS-based anti-evasion technique for botnets detection.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

A Technique for the Botnet Detection Based on DNS-Traffic Analysis.
Proceedings of the Computer Networks - 22nd International Conference, 2015

2014
A Technique for Detection of Bots Which Are Using Polymorphic Code.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Botnet detection technique for corporate area network.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy Logic.
Proceedings of the Computer Networks, 20th International Conference, 2013

2012
Multi-agent Based Approach of Botnet Detection in Computer Systems.
Proceedings of the Computer Networks - 19th International Conference, 2012

2011
Adaptive Information Technology of the Trojan' Detection in Computer Systems.
Int. J. Comput., 2011

The technique for computer systems Trojan diagnosis in the monitor mode.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011


  Loading...