Volodymyr Sokolov
Orcid: 0000-0002-9349-7946Affiliations:
- Borys Grinchenko Kyiv University, Ukraine
According to our database1,
Volodymyr Sokolov
authored at least 54 papers
between 2019 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cryptogr., September, 2024
Proceedings of the Digital Economy Concepts and Technologies Workshop, 2024
Proceedings of the Digital Economy Concepts and Technologies Workshop, 2024
Methodology of network infrastructure analysis as part of migration to zero-trust architecture (short paper).
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024
Model to formation data base of secondary parameters for assessing status of the state secret protection.
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024
Integration of smart contracts and artificial intelligence using cryptographic oracles (short paper).
Proceedings of the Classic, 2024
Proceedings of the Classic, 2024
Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024
Method for managing IT incidents in critical information infrastructure facilities (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
Research of the graphic model of the points of the elliptic curve in the Edward form (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024
2023
Proceedings of the 18th IEEE International Conference on Computer Science and Information Technologies, 2023
Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves.
Proceedings of the Workshop on Classic, 2023
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023
Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023
2022
Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center.
Proceedings of the Selected Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things (TTSIIT 2022), 2022
Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir (short paper).
Proceedings of the Selected Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things (TTSIIT 2022), 2022
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop MoMLeT&DS 2022, 2022
Proceedings of the Information Technology for Education, Science, and Technics, 2022
Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022
Proceedings of The Fifth International Workshop on Computer Modeling and Intelligent Systems (CMIS-2022), 2022
Dynamic model of guarantee capacity and cyber security management in the critical automated system.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022
2021
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021
Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021
2020
Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, 2020
Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, 2020
Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies.
Proceedings of the Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), 2020
Proceedings of the Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), 2020
2019
CoRR, 2019
Implementation of an Index Optimize Technology for Highly Specialized Terms based on the Phonetic Algorithm Metaphone.
CoRR, 2019
Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless Networks.
CoRR, 2019
Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4-2.5 GHz.
CoRR, 2019
CoRR, 2019
Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio.
CoRR, 2019
Low-Cost Spectrum Analyzers for Channel Allocation in Wireless Networks 2.4 GHz Range.
CoRR, 2019
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019
Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio.
Proceedings of the Modern Machine Learning Technologies, 2019
Proceedings of the Modern Machine Learning Technologies, 2019
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019