Page Index - volodymyr-sokolov/publications GitHub Wiki
216 page(s) in this GitHub Wiki:
- Home
- Profiles
- A System for Assessing the Interdependencies of Information System Agents in Information Security Risk Management using Cognitive Maps
- Please reload this page
- Accuracy Improvement of Spoken Language Identification System for Close‐Related Languages
- Please reload this page
- Analysis of 2‐Isogeny Properties of Generalized Form Edwards Curves
- Please reload this page
- Analysis of Automatic Speech Recognition Methods
- Please reload this page
- Analysis of Implementation Results of the Distributed Access Control System
- Please reload this page
- Analysis of the Process of Information Transfer from the Source‐to‐User in Terms of Information Impact
- Please reload this page
- Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems
- Please reload this page
- Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models
- Please reload this page
- Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency
- Please reload this page
- Assessing Approaches of IT Infrastructure Audit
- Please reload this page
- Authentication System by Human Brainwaves using Machine Learning and Artificial Intelligence
- Please reload this page
- Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition
- Please reload this page
- Bandwidth Research of Wireless IoT Switches
- Please reload this page
- Bluetooth Low‐Energy Beacon Resistance to Jamming Attack
- Please reload this page
- Brainwave‐based Authentication using Features Fusion
- Please reload this page
- Classical and Post‐Quantum Encryption for GDPR
- Please reload this page
- Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves
- Please reload this page
- CSIKE‐ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution
- Please reload this page
- Data Mining usage for Social Networks
- Please reload this page
- Decentralized Access Demarcation System Construction in Situational Center Network
- Please reload this page
- Deduplication Method for Ukrainian Last Names, Medicinal Names, and Toponyms based on Metaphone Phonetic Algorithm
- Please reload this page
- Determining the Zone of Successful Interaction in RFID Technologies
- Please reload this page
- Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range
- Please reload this page
- Development of a Conceptual Model of Adaptive Access Rights Management with using the Apparatus of Petri Nets
- Please reload this page
- Development of a Mobile Automated Air Quality Monitoring System for Use in Places of Technogenic Accidents on Railway Transport
- Please reload this page
- Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated Systems
- Please reload this page
- Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves
- Please reload this page
- ENGENSEC
- Please reload this page
- Enhancing Information Transmission Security with Stochastic Codes
- Please reload this page
- Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network
- Please reload this page
- Evaluation of State‐of‐the‐Art Machine Learning Smart Contract Vulnerability Detection Method
- Please reload this page
- Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum
- Please reload this page
- Experimental Evaluation of Phishing Attack on High School Students
- Please reload this page
- Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane
- Please reload this page
- Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center
- Please reload this page
- Formation of High School Students’ Resistance to Destructive Information Influences
- Please reload this page
- Formation of Requirements for the Electronic Record‐Book in Guaranteed Information Systems of Distance Learning
- Please reload this page
- Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir
- Please reload this page
- Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm
- Please reload this page
- Implementation of Active Cybersecurity Education in Ukrainian Higher School
- Please reload this page
- Implementation of Active Learning in the Master’s Program on Cybersecurity
- Please reload this page
- Implementation of Social Engineering Attack at Institution of Higher Education
- Please reload this page
- Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves
- Please reload this page
- Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept
- Please reload this page
- Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir
- Please reload this page
- Integrated Protection Strategies and Adaptive Resource Distribution for Secure Video Streaming over a Bluetooth Network
- Please reload this page
- Integration of Smart Contracts and Artificial Intelligence using Cryptographic Oracles
- Please reload this page
- Invasion Detection Model using Two‐Stage Criterion of Detection of Network Anomalies
- Please reload this page
- Investigation of Availability of Wireless Access Points based on Embedded Systems
- Please reload this page
- Investigation of the IoT Device Lifetime with Secure Data Transmission
- Please reload this page
- Jump‐Stay Jamming Attack on Wi‐Fi Systems
- Please reload this page
- Last Mile Technique for Wireless Delivery System using an Accelerating Lens
- Please reload this page
- Men‐in‐the‐Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio
- Please reload this page
- Method for Increasing the Various Sources Data Consistency for IoT Sensors
- Please reload this page
- Method for Managing IT Incidents in Critical Information Infrastructure Facilities
- Please reload this page
- Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation
- Please reload this page
- Methodology for Choosing a Consensus Algorithm for Blockchain Technology
- Please reload this page
- Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods
- Please reload this page
- Methodology of Network Infrastructure Analysis as Part of Migration to Zero‐Trust Architecture
- Please reload this page
- Methods for Predicting Failures in a Smart Home
- Please reload this page
- Model to Formation Data Base of Secondary Parameters for Assessing Status of the State Secret Protection
- Please reload this page
- Modeling CSIKE Algorithm on Non‐Cyclic Edwards Curves
- Please reload this page
- Modeling of 3‐ and 5‐Isogenies of Supersingular Edwards Curves
- Please reload this page
- Models and Algorithms for Analyzing Information Risks during the Security Audit of Personal Data Information System
- Please reload this page
- Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems
- Please reload this page
- Modified Delta Maintainability Model of Object‐Oriented Software
- Please reload this page
- Monitoring Subsystem for Wireless Systems Based on Miniature Spectrum Analyzers
- Please reload this page
- Multifunctional CRS Encryption Scheme on Isogenies of Non‐Supersingular Edwards Curves
- Please reload this page
- Natural Language Technology to Ensure the Safety of Speech Information
- Please reload this page
- Operation System for Modern Unmanned Aerial Vehicles
- Please reload this page
- Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network
- Please reload this page
- Pavlo Skladannyi, Ph.D.
- Please reload this page
- Performing Sniffing and Spoofing Attack Against ADS‐B and Mode S using Software Define Radio
- Please reload this page
- Person‐of‐Interest Detection on Mobile Forensics Data — AI‐Driven Roadmap
- Please reload this page
- Platform for the Security of Cyber‐Physical Systems and the IoT in the Intellectualization of Society
- Please reload this page
- Problematic Issues of the Accelerating Lens Deployment
- Please reload this page
- Properties of Isogeny Graph of Non‐Cyclic Edwards Curves
- Please reload this page
- Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network
- Please reload this page
- Prototyping Methodology of End‐to‐End Speech Analytics Software
- Please reload this page
- Publication List of Pavlo Skladannyi
- Please reload this page
- Publication List of Volodymyr Sokolov
- Please reload this page
- Research of the Graphic Model of the Points of the Elliptic Curve in the Edward Form
- Please reload this page
- Research of UAV and Sensor Network Integration Features for Routing Optimization and Energy Consumption Reduction
- Please reload this page
- Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11
- Please reload this page
- Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel
- Please reload this page
- Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network
- Please reload this page
- SciVal Topics
- Please reload this page
- Security Rating Metrics for Distributed Wireless Systems
- Please reload this page
- Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches
- Please reload this page
- Smart Card for Storing and Displaying Identifiers in Loyalty System
- Please reload this page
- Smart Home Subsystem for Calculating the Quality of Public Utilities
- Please reload this page
- Social Engineering Penetration Testing in Higher Education Institutions
- Please reload this page
- Stability Verification of Self‐Organized Wireless Networks with Block Encryption
- Please reload this page
- Sustainability Research of the Secure Wireless Communication System with Channel Reservation
- Please reload this page
- Techniques Comparison for Natural Language Processing
- Please reload this page
- Technology for Information and Cyber Security in Higher Education Institutions of Ukraine
- Please reload this page
- Technology of Location Hiding by Spoofing the Mobile Operator IP Address
- Please reload this page
- Tokenomics and Perspectives of Proof of Stake
- Please reload this page
- Training Model for Professionals in the Field of Information and Cyber Security in the Higher Educational Institutions of Ukraine
- Please reload this page
- Transferability Evaluation of Speech Emotion Recognition Between Different Languages
- Please reload this page
- Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity
- Please reload this page
- Video Channel Suppression Method of Unmanned Aerial Vehicles
- Please reload this page
- Volodymyr Sokolov, Ph.D.
- Please reload this page
- Wireless Sensors for Brain Activity — A Survey
- Please reload this page
- Wi‐Fi Interference Resistance to Jamming Attack
- Please reload this page
- Wi‐Fi Repeater Influence on Wireless Access
- Please reload this page
- ZigBee Network Resistance to Jamming Attacks
- Please reload this page