Folgen
Сергій Гнатюк, Sergiy Gnatyuk
Titel
Zitiert von
Zitiert von
Jahr
Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior
Z Hu, R Odarchenko, S Gnatyuk, M Zaliskyi, A Chaplits, S Bondar, ...
International Journal of Computer Network and Information Security 12 (6), 1, 2020
832020
Critical aviation information systems cybersecurity
E Shahbazian, G Rogova
Meeting security challenges through data analytics and decision support 47, 308, 2016
742016
High-speed and secure PRNG for cryptographic applications
Z Hu, S Gnatyuk, T Okhrimenko, S Tynymbayev, M Iavich
International Journal of Computer Network and Information Security 12 (3), 1-10, 2020
722020
Modern quantum technologies of information security against cyber‐terrorist attacks
O Korchenko, Y Vasiliu, S Gnatyuk
Aviation 14 (2), 58-69, 2010
702010
Кібертероризм: історія розвитку, сучасні тенденції та контрзаходи
С Гнатюк
Безпека інформації, 118-129, 2013
602013
Secure hash function constructing for future communication systems and networks
S Gnatyuk, V Kinzeryavyy, K Kyrychenko, K Yubuzova, M Aleksander, ...
Advances in Artificial Systems for Medicine and Education II 2, 561-569, 2020
452020
Security key indicators assessment for modern cellular networks
R Odarchenko, V Gnatyuk, S Gnatyuk, A Abakumova
2018 IEEE First International Conference on System Analysis & Intelligent …, 2018
442018
Anomaly detection system in secure cloud computing environment
Z Hu, S Gnatyuk, O Koval, V Gnatyuk, S Bondarovets
International Journal of Computer Network and Information Security 9 (4), 10, 2017
442017
Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems
Z Hassan, R Odarchenko, S Gnatyuk, A Zaman, M Shah
2018 IEEE 5th International Conference on Methods and Systems of Navigation …, 2018
432018
Network Society: Aggregate Topological Models
A Tikhomirov, A Afanasyev, N Kinash, A Trufanov, OG Berestneva, ...
Springer Verlag, 2014
432014
Сучасні квантові технології захисту інформації
ОГ Корченко, ЄВ Васіліу, СО Гнатюк
Науково-технічний журнал" Захист інформації", 2009
412009
Efficiency increasing method for quantum secure direct communication protocols
S Gnatyuk, T Zhmurko, P Falat
2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015
402015
The device for multiplying polynomials modulo an irreducible polynomial
M Kalimoldayev, S Tynymbayev, S Gnatyuk, M Ibraimov, M Magzom
News of the National Academy of Sciences of the Republic of Kazakhstan …, 2019
382019
Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks.
M Zalisky, R Odarchenko, S Gnatyuk, Y Petrova, A Chaplits
IDDM, 193-204, 2018
382018
New secure block cipher for critical applications: design, implementation, speed and security analysis
S Gnatyuk, B Akhmetov, V Kozlovskyi, V Kinzeryavyy, M Aleksander, ...
Advances in artificial systems for medicine and education III, 93-104, 2020
372020
Analysis of self-similar traffic models in computer networks
JS Al-Azzeh, M Al Hadidi, R Odarchenko, S Gnatyuk, Z Shevchuk, Z Hu
International Review on Modelling and Simulations 10 (5), 328-336, 2017
372017
Synergistic effects of information and cybernetic interaction in civil aviation
Y Danik, R Hryschuk, S Gnatyuk
Aviation 20 (3), 137-144, 2016
362016
Unified data model for defining state critical information infrastructure in civil aviation
S Gnatyuk, M Aleksander, V Sydorenko
2018 IEEE 9th International Conference on Dependable Systems, Services and …, 2018
332018
Method of searching birationally equivalent Edwards curves over binary fields
Z Hu, S Gnatyuk, M Kovtun, N Seilova
Advances in Computer Science for Engineering and Education 13, 309-319, 2019
322019
Кібернетична безпека держави: характерні ознаки та проблемні аспекти
ОГ Корченко, ВЛ Бурячок, СО Гнатюк
Науковий журнал" Безпека інформації", 2013
312013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20