Skip to contents

  1. Yevseiev, Serhii [Author]; Ponomarenko, Volodymir [Author]; Laptiev, Oleksandr [Author]; Milov, Oleksandr [Author]; Korol, Olha [Author]; Milevskyi, Stanislav [Author]; Pohasii, Serhii [Author]; Tkachov, Andrii [Author]; Shmatko, Olexander [Author]; Melenti, Yevgen [Author]; Sievierinov, Оleksandr [Author]; Ostapov, Sergey [Author]; Gavrilova, Alla [Author]; Tsyhanenko, Oleksii [Author]; Herasimov, Sergey [Author]; Nyemkova, Elena [Author]; Tomashevsky, Bogdan [Author]; Hrod, Ivan [Author]; Opirskyy, Ivan [Author]; Zvieriev, Volodymyr [Author]; Prokopenko, Oleksandr [Author]; Savchenko, Vitalii [Author]; Barabash, Oleg [Author]; Sobchuk, Valentyn [Author]; [...] ; Yevseiev, Serhii [Editor]; Ponomarenko, Volodymir [Editor]; Laptiev, Oleksandr [Editor]; Milov, Oleksandr [Editor]

    Synergy of building cybersecurity systems

    Books
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Kharkiv: PC TECHNOLOGY CENTER, 2021

  2. Yaroslav Oleksandrovych Kliuchka; Olexander Vitaliyovych Shmatko

    ПОРІВНЯННЯ ТЕХНОЛОГІЇ БЛОКЧЕЙН І СПРЯМОВАНОГО АЦИКЛІЧНОГО ГРАФА ПРИ ЗБЕРІГАННІ І ОБРОБЦІ ДАНИХ В РОЗПОДІЛЕНОМУ РЕЄСТРІ

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    2020

    Published in: Вісник Національного технічного університету "ХПÌ": Системний аналіз (2020) 1, Seite 106-116

  3. Shmatko, Olexander; Balakireva, Svitlana; Vlasov, Andrii; Zagorodna, Nataliya; Korol, Olha; Milov, Oleksandr; Petrov, Oleksii; Pohasii, Serhii; Rzayev, Khazail; Khvostenko, Vladyslav

    Development of methodological foundations for designing a classifier of threats to cyberphysical systems

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Private Company Technology Center, 2020

    Published in: Eastern-European Journal of Enterprise Technologies, 3 (2020) 9 (105), Seite 6-19

  4. Yevseiev, Serhii; Aleksiyev, Volodymyr; Balakireva, Svitlana; Peleshok, Yevhen; Milov, Oleksandr; Petrov, Oleksii; Rayevnyeva, Olena; Tomashevsky, Bogdan; Tyshyk, Ivan; Shmatko, Olexander

    Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Private Company Technology Center, 2019

    Published in: Eastern-European Journal of Enterprise Technologies, 3 (2019) 9 (99), Seite 49-63

  5. Yevseiev, Serhii; Tsyhanenko, Oleksii; Gavrilova, Alla; Guzhva, Viktor; Milov, Oleksandr; Moskalenko, Valentina; Opirskyy, Ivan; Roma, Oleksandr; Tomashevsky, Bogdan; Shmatko, Olexander

    Development of Niederreiter hybrid crypto-code structure on flawed codes

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Private Company Technology Center, 2019

    Published in: Eastern-European Journal of Enterprise Technologies, 1 (2019) 9 (97), Seite 27-38

  6. Shmatko, Olexander; Herasymov, Serhii; Lysetskyi, Yurii; Yevseiev, Serhii; Sievierinov, Оleksandr; Voitko, Tetiana; Zakharzhevskyi, Andrii; Makogon, Helen; Nesterov, Alexander; Bondarenko, Kyrylo

    Development of the automated decision-making system synthesis method in the management of information security channels

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Private Company Technology Center, 2023

    Published in: Eastern-European Journal of Enterprise Technologies, 6 (2023) 9 (126), Seite 39-49

  7. Yevseiev, Serhii; Tsyhanenko, Oleksii; Ivanchenko, Serhii; Aleksiyev, Volodymyr; Verheles, Dmytrо; Volkov, Sergey; Korolev, Roman; Kots, Hryhorii; Milov, Oleksandr; Shmatko, Olexander

    Practical implementation of the Niederreiter modified crypto­code system on truncated elliptic codes

    Articles
    View online
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Private Company Technology Center, 2018

    Published in: Eastern-European Journal of Enterprise Technologies, 6 (2018) 4 (96), Seite 24-31