Publication List of Pavlo Skladannyi - volodymyr-sokolov/publications GitHub Wiki

Articles

2022 Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency

2022 Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models

2022 Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network

2022 Development of a Mobile Automated Air Quality Monitoring System for Use in Places of Technogenic Accidents on Railway Transport

2020 Technology for Information and Cyber Security in Higher Education Institutions of Ukraine

2019 Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm

2018 Development of a Conceptual Model of Adaptive Access Rights Management with using the Apparatus of Petri Nets

2018 Training Model for Professionals in the Field of Information and Cyber Security in the Higher Educational Institutions of Ukraine

Book Chapters (Springer)

2025 Evaluation of State‐of‐the‐Art Machine Learning Smart Contract Vulnerability Detection Method

2025 Accuracy Improvement of Spoken Language Identification System for Close‐Related Languages

2023 Social Engineering Penetration Testing in Higher Education Institutions

2022 Implementation of Active Cybersecurity Education in Ukrainian Higher School

Conference Papers

IEEE

2024 Determining the Zone of Successful Interaction in RFID Technologies

2024 Wi‐Fi Interference Resistance to Jamming Attack

2024 Wi‐Fi Repeater Influence on Wireless Access

2024 ZigBee Network Resistance to Jamming Attacks

2023 Jump‐Stay Jamming Attack on Wi‐Fi Systems

2023 Bluetooth Low‐Energy Beacon Resistance to Jamming Attack

2023 Method for Increasing the Various Sources Data Consistency for IoT Sensors

2023 Problematic Issues of the Accelerating Lens Deployment

2022 Video Channel Suppression Method of Unmanned Aerial Vehicles

2022 Assessing Approaches of IT Infrastructure Audit

2022 Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems

2022 Technology of Location Hiding by Spoofing the Mobile Operator IP Address

2022 Performing Sniffing and Spoofing Attack Against ADS‐B and Mode S using Software Define Radio

2021 Last Mile Technique for Wireless Delivery System using an Accelerating Lens

CEUR-WS

2025 A System for Assessing the Interdependencies of Information System Agents in Information Security Risk Management using Cognitive Maps

2025 Models and Algorithms for Analyzing Information Risks during the Security Audit of Personal Data Information System

2024 Integrated Protection Strategies and Adaptive Resource Distribution for Secure Video Streaming over a Bluetooth Network

2024 Research of UAV and Sensor Network Integration Features for Routing Optimization and Energy Consumption Reduction

2024 Platform for the Security of Cyber‐Physical Systems and the IoT in the Intellectualization of Society

2024 Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods

2024 Enhancing Information Transmission Security with Stochastic Codes

2024 Methods for Predicting Failures in a Smart Home

2024 Integration of Smart Contracts and Artificial Intelligence using Cryptographic Oracles

2024 Methodology of Network Infrastructure Analysis as Part of Migration to Zero‐Trust Architecture

2024 Model to Formation Data Base of Secondary Parameters for Assessing Status of the State Secret Protection

2024 Methodology for Choosing a Consensus Algorithm for Blockchain Technology

2023 Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir

2023 Formation of High School Students’ Resistance to Destructive Information Influences

2023 Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept

2023 Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network

2023 Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated Systems

2023 Multifunctional CRS Encryption Scheme on Isogenies of Non‐Supersingular Edwards Curves

2022 Analysis of the Process of Information Transfer from the Source‐to‐User in Terms of Information Impact

2022 Modified Delta Maintainability Model of Object-Oriented Software

2022 Prototyping Methodology of End‐to‐End Speech Analytics Software

2022 Modeling CSIKE Algorithm on Non‐Cyclic Edwards Curves

2022 Decentralized Access Demarcation System Construction in Situational Center Network

2022 Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves

2022 Natural Language Technology to Ensure the Safety of Speech Information

2022 Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir

2022 Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center

2022 Stability Verification of Self‐Organized Wireless Networks with Block Encryption

2021 Formation of Requirements for the Electronic Record‐Book in Guaranteed Information Systems of Distance Learning

2021 Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves

2020 Operation System for Modern Unmanned Aerial Vehicles

2020 Data Mining usage for Social Networks

2020 Invasion Detection Model using Two‐Stage Criterion of Detection of Network Anomalies

2020 Analysis of 2‐Isogeny Properties of Generalized Form Edwards Curves

2020 Modeling of 3‐ and 5‐Isogenies of Supersingular Edwards Curves

2019 Security Rating Metrics for Distributed Wireless Systems