Method for optimization of information security systems behavior under conditions of influences Z Hu, Y Khokhlachova, V Sydorenko, I Opirskyy International Journal of Intelligent Systems and Applications 9 (12), 46, 2017 | 62 | 2017 |
Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period SP Yevseiev, RV Korolyov, A Tkachov, O Laptiev, I Opirskyy, O Soloviova | 31 | 2020 |
Synergy of building cybersecurity systems S Yevseiev, V Ponomarenko, O Laptiev, O Milov, O Korol, S Milevskyi, ... | 29 | 2021 |
Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems OV Milov, A Voitko, I Husarova, O Domaskin, I Ivanchenko, HP Kots, ... | 24 | 2019 |
Analysis of the attack vectors used by threat actors during the pandemic V Susukailo, I Opirskyy, S Vasylyshyn 2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020 | 23 | 2020 |
Analysis and Comparison of the NIST SP 800-53 and ISO/IEC 27001: 2013 Y Kurii, I Opirskyy NIST Spec. Publ 800 (53), 10, 2022 | 21 | 2022 |
A multicriterial analysis of the efficiency of conservative information security systems V Dudykevych, I Prokopyshyn, V Chekurin, I Opirskyy, Y Lakh, T Kret, ... Восточно-Европейский журнал передовых технологий, 6-13, 2019 | 18 | 2019 |
Development of Niederreiter hybrid crypto-code structure on flawed codes S Yevseiev, O Tsyhanenko, A Gavrilova, V Guzhva, O Milov, ... Восточно-Европейский журнал передовых технологий, 27-38, 2019 | 16 | 2019 |
Modeling of security systems for critical infrastructure facilities S Yevseiev, R Hryshchuk, K Molodetska, M Nazarkevych, V Hrytsyk, ... PC TECHNOLOGY CENTER, 2022 | 15 | 2022 |
Formation of requirements for the electronic record-book in guaranteed information systems of distance learning H Hulak, L Kriuchkova, P Skladannyi, I Opirskyy Cybersecurity Providing in Information and Telecommunication Systems 2021 …, 2021 | 12 | 2021 |
Management of information protection based on the integrated implementation of decision support systems V Lakhno, V Kozlovskyi, Y Boiko, A Mishchenko, I Opirskyy Восточно-Европейский журнал передовых технологий, 36-42, 2017 | 12 | 2017 |
A model of decoy system based on dynamic attributes for cybercrime investigation S Vasylyshyn, V Susukailo, I Opirskyy, Y Kurii, I Tyshyk Eastern-European Journal of Enterprise Technologies 1 (9), 121, 2023 | 11 | 2023 |
Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors V Petrivskyi, V Shevchenko, S Yevseiev, O Milov, O Laptiev, O Bychkov, ... Eastern-European journal of enterprise technologies 1 (9), 115, 2022 | 11 | 2022 |
Methodology of ISMS establishment against modern cybersecurity threats V Susukailo, I Opirsky, O Yaremko Future Intent-Based Networking: On the QoS Robust and Energy Efficient …, 2021 | 11 | 2021 |
METHOD OF ASSESSMENT OF FREQUENCY RESOLUTION FOR AIRCRAFT. S Yevseiev, S Herasymov, O Kuznietsov, I Opirskyy, A Volkov, Y Peleshok, ... Eastern-European Journal of Enterprise Technologies 122 (9), 2023 | 10 | 2023 |
Analysis of the use of software baits as a means of ensuring information security S Vasylyshyn, I Opirskyy, V Susukailo 2020 IEEE 15th International Conference on Computer Sciences and Information …, 2020 | 10 | 2020 |
Аналіз апаратної підтримки криптографії у пристроях інтернету речей Я Совин, Ю Наконечний, І Опірський, М Стахів Безпека інформації, 36-48, 2018 | 10 | 2018 |
Проблематика основного постулату прогнозування НСД І Опірський Сучасна спеціальна техніка, 3-8, 2015 | 10 | 2015 |
Research on Security Challenges in Cloud Environments and Solutions based on the" Security-as-Code" Approach. O Vakhula, I Opirskyy, O Mykhaylova CPITS II, 55-69, 2023 | 9 | 2023 |
Інформаційно-психологічне протиборство в Україні ММ Браіловський, ІС Іванченко, ІР Опірський, ВО Хорошко Ukrainian Scientific Journal of Information Security 25 (3), 144-149, 2019 | 9 | 2019 |