关注
Іван Опірський, Иван Опирский, Ivan Opirskyy, Ivan Opirsky, I. Opirskyy, I.R. Opirskyy, І.Р
Іван Опірський, Иван Опирский, Ivan Opirskyy, Ivan Opirsky, I. Opirskyy, I.R. Opirskyy, І.Р
завідувач кафедри захисту інформації, Національний університет "Львівська політехніка"
在 lpnu.ua 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Method for optimization of information security systems behavior under conditions of influences
Z Hu, Y Khokhlachova, V Sydorenko, I Opirskyy
International Journal of Intelligent Systems and Applications 9 (12), 46, 2017
622017
Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period
SP Yevseiev, RV Korolyov, A Tkachov, O Laptiev, I Opirskyy, O Soloviova
312020
Synergy of building cybersecurity systems
S Yevseiev, V Ponomarenko, O Laptiev, O Milov, O Korol, S Milevskyi, ...
292021
Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems
OV Milov, A Voitko, I Husarova, O Domaskin, I Ivanchenko, HP Kots, ...
242019
Analysis of the attack vectors used by threat actors during the pandemic
V Susukailo, I Opirskyy, S Vasylyshyn
2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020
232020
Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001: 2013
Y Kurii, I Opirskyy
NIST Spec. Publ 800 (53), 10, 2022
212022
A multicriterial analysis of the efficiency of conservative information security systems
V Dudykevych, I Prokopyshyn, V Chekurin, I Opirskyy, Y Lakh, T Kret, ...
Восточно-Европейский журнал передовых технологий, 6-13, 2019
182019
Development of Niederreiter hybrid crypto-code structure on flawed codes
S Yevseiev, O Tsyhanenko, A Gavrilova, V Guzhva, O Milov, ...
Восточно-Европейский журнал передовых технологий, 27-38, 2019
162019
Modeling of security systems for critical infrastructure facilities
S Yevseiev, R Hryshchuk, K Molodetska, M Nazarkevych, V Hrytsyk, ...
PC TECHNOLOGY CENTER, 2022
152022
Formation of requirements for the electronic record-book in guaranteed information systems of distance learning
H Hulak, L Kriuchkova, P Skladannyi, I Opirskyy
Cybersecurity Providing in Information and Telecommunication Systems 2021 …, 2021
122021
Management of information protection based on the integrated implementation of decision support systems
V Lakhno, V Kozlovskyi, Y Boiko, A Mishchenko, I Opirskyy
Восточно-Европейский журнал передовых технологий, 36-42, 2017
122017
A model of decoy system based on dynamic attributes for cybercrime investigation
S Vasylyshyn, V Susukailo, I Opirskyy, Y Kurii, I Tyshyk
Eastern-European Journal of Enterprise Technologies 1 (9), 121, 2023
112023
Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors
V Petrivskyi, V Shevchenko, S Yevseiev, O Milov, O Laptiev, O Bychkov, ...
Eastern-European journal of enterprise technologies 1 (9), 115, 2022
112022
Methodology of ISMS establishment against modern cybersecurity threats
V Susukailo, I Opirsky, O Yaremko
Future Intent-Based Networking: On the QoS Robust and Energy Efficient …, 2021
112021
METHOD OF ASSESSMENT OF FREQUENCY RESOLUTION FOR AIRCRAFT.
S Yevseiev, S Herasymov, O Kuznietsov, I Opirskyy, A Volkov, Y Peleshok, ...
Eastern-European Journal of Enterprise Technologies 122 (9), 2023
102023
Analysis of the use of software baits as a means of ensuring information security
S Vasylyshyn, I Opirskyy, V Susukailo
2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020
102020
Аналіз апаратної підтримки криптографії у пристроях інтернету речей
Я Совин, Ю Наконечний, І Опірський, М Стахів
Безпека інформації, 36-48, 2018
102018
Проблематика основного постулату прогнозування НСД
І Опірський
Сучасна спеціальна техніка, 3-8, 2015
102015
Research on Security Challenges in Cloud Environments and Solutions based on the" Security-as-Code" Approach.
O Vakhula, I Opirskyy, O Mykhaylova
CPITS II, 55-69, 2023
92023
Інформаційно-психологічне протиборство в Україні
ММ Браіловський, ІС Іванченко, ІР Опірський, ВО Хорошко
Ukrainian Scientific Journal of Information Security 25 (3), 144-149, 2019
92019
系统目前无法执行此操作,请稍后再试。
文章 1–20