Volodymyr Sokolov

Orcid: 0000-0002-9349-7946

Affiliations:
  • Borys Grinchenko Kyiv University, Ukraine


According to our database1, Volodymyr Sokolov authored at least 54 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves.
Cryptogr., September, 2024

Methodology for Choosing a Consensus Algorithm for Blockchain Technology.
Proceedings of the Digital Economy Concepts and Technologies Workshop, 2024

Tokenomics and Perspectives of Proof of Stake.
Proceedings of the Digital Economy Concepts and Technologies Workshop, 2024

Methodology of network infrastructure analysis as part of migration to zero-trust architecture (short paper).
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024

Model to formation data base of secondary parameters for assessing status of the state secret protection.
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024., 2024

Integration of smart contracts and artificial intelligence using cryptographic oracles (short paper).
Proceedings of the Classic, 2024

Classical and post-quantum encryption for GDPR (short paper).
Proceedings of the Classic, 2024

Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Person-of-Interest Detection on Mobile Forensics Data - AI-Driven Roadmap.
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), 2024

Method for managing IT incidents in critical information infrastructure facilities (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Research of the graphic model of the points of the elliptic curve in the Edward form (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

2023
Brainwave-based authentication using features fusion.
Comput. Secur., June, 2023

Jump-Stay Jamming Attack on Wi-Fi Systems.
Proceedings of the 18th IEEE International Conference on Computer Science and Information Technologies, 2023

Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves.
Proceedings of the Workshop on Classic, 2023

CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Smart Home Subsystem for Calculating the Quality of Public Utilities (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2023

Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

Properties of Isogeny Graph of Non-Cyclic Edwards Curves (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2022
Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center.
Proceedings of the Selected Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things (TTSIIT 2022), 2022

Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir (short paper).
Proceedings of the Selected Papers of the Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things (TTSIIT 2022), 2022

Prototyping Methodology of End-to-End Speech Analytics Software.
Proceedings of the Modern Machine Learning Technologies and Data Science Workshop MoMLeT&DS 2022, 2022

Implementation of Active Cybersecurity Education in Ukrainian Higher School.
Proceedings of the Information Technology for Education, Science, and Technics, 2022

Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, 2022

Stability Verification of Self-Organized Wireless Networks with Block Encryption.
Proceedings of The Fifth International Workshop on Computer Modeling and Intelligent Systems (CMIS-2022), 2022

Dynamic model of guarantee capacity and cyber security management in the critical automated system.
Proceedings of the 2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), 2022

2021
Analysis of Automatic Speech Recognition Methods (short paper).
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Natural Language Technology to Ensure the Safety of Speech Information.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Decentralized Access Demarcation System Construction in Situational Center Network.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity (short paper).
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves.
Proceedings of the Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), 2021

Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), 2021

2020
3- and 5-Isogenies of Supersingular Edwards Curves.
CoRR, 2020

Research of Caller ID Spoofing Launch, Detection, and Defense.
CoRR, 2020

Techniques Comparison for Natural Language Processing.
Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, 2020

Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves.
Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science (MoMLeT+DS 2020). Volume I: Main Conference, 2020

Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies.
Proceedings of the Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), 2020

Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves.
Proceedings of the Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), 2020

2019
Implementation of XTEA Encryption Protocol based on IEEE 802.15.4 Wireless Systems.
CoRR, 2019

Implementation of an Index Optimize Technology for Highly Specialized Terms based on the Phonetic Algorithm Metaphone.
CoRR, 2019

Comparative Bandwidth Analysis of Low-Power Wireless IoT-Switches.
CoRR, 2019

Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless Networks.
CoRR, 2019

Research of Stability in Ad Hoc Self-Organizated Wireless Networks.
CoRR, 2019

Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4-2.5 GHz.
CoRR, 2019

Method of Counteraction in Social Engineering on Information Activity Objectives.
CoRR, 2019

Internet of Things Security Problems.
CoRR, 2019

Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio.
CoRR, 2019

Low-Cost Spectrum Analyzers for Channel Allocation in Wireless Networks 2.4 GHz Range.
CoRR, 2019

Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks.
CoRR, 2019

Analysis of Recent Attacks based on Social Engineering Techniques.
CoRR, 2019

Investigation of the IoT Device Lifetime with Secure Data Transmission.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio.
Proceedings of the Modern Machine Learning Technologies, 2019

Security Rating Metrics for Distributed Wireless Systems.
Proceedings of the Modern Machine Learning Technologies, 2019

Implementation of Social Engineering Attack at Institution of Higher Education.
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), 2019


  Loading...