Сергій Гнатюк, Sergiy Gnatyuk
Cited by
Cited by
Statistical Techniques for Detecting Cyberattacks on Computer Networks Based on an Analysis of Abnormal Traffic Behavior.
Z Hu, R Odarchenko, S Gnatyuk, M Zaliskyi, A Chaplits, S Bondar, ...
International Journal of Computer Network & Information Security 12 (6), 2020
Critical aviation information systems cybersecurity
E Shahbazian, G Rogova
Meeting security challenges through data analytics and decision support 47, 308, 2016
Modern quantum technologies of information security against cyber‐terrorist attacks
O Korchenko, Y Vasiliu, S Gnatyuk
Aviation 14 (2), 58-69, 2010
Кібертероризм: історія розвитку, сучасні тенденції та контрзаходи
С Гнатюк
Безпека інформації, 118-129, 2013
High-Speed and Secure PRNG for Cryptographic Applications.
Z Hu, S Gnatyuk, T Okhrimenko, S Tynymbayev, M Iavich
International Journal of Computer Network & Information Security 12 (3), 2020
Secure hash function constructing for future communication systems and networks
S Gnatyuk, V Kinzeryavyy, K Kyrychenko, K Yubuzova, M Aleksander, ...
Advances in Artificial Systems for Medicine and Education II 2, 561-569, 2020
Anomaly detection system in secure cloud computing environment
Z Hu, S Gnatyuk, O Koval, V Gnatyuk, S Bondarovets
International Journal of Computer Network and Information Security 9 (4), 10, 2017
Сучасні квантові технології захисту інформації
ОГ Корченко, ЄВ Васіліу, СО Гнатюк, ЕВ Василиу
Національний авіаційний університет, 2010
Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems
Z Hassan, R Odarchenko, S Gnatyuk, A Zaman, M Shah
2018 IEEE 5th International Conference on Methods and Systems of Navigation …, 2018
Security key indicators assessment for modern cellular networks
R Odarchenko, V Gnatyuk, S Gnatyuk, A Abakumova
2018 IEEE First International Conference on System Analysis & Intelligent …, 2018
Network Society: Aggregate Topological Models
A Tikhomirov, A Afanasyev, N Kinash, A Trufanov, OG Berestneva, ...
Springer Verlag, 2014
Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks.
M Zalisky, R Odarchenko, S Gnatyuk, Y Petrova, A Chaplits
IDDM, 193-204, 2018
The device for multiplying polynomials modulo an irreducible polynomial
M Kalimoldayev, S Tynymbayev, S Gnatyuk, M Ibraimov, M Magzom
News of the National Academy of Sciences of the Republic of Kazakhstan …, 2019
Efficiency increasing method for quantum secure direct communication protocols
S Gnatyuk, T Zhmurko, P Falat
2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015
Analysis of self-similar traffic models in computer networks
JS Al-Azzeh, M Al Hadidi, R Odarchenko, S Gnatyuk, Z Shevchuk, Z Hu
International Review on Modelling and Simulations 10 (5), 328-336, 2017
New secure block cipher for critical applications: Design, implementation, speed and security analysis
S Gnatyuk, B Akhmetov, V Kozlovskyi, V Kinzeryavyy, M Aleksander, ...
Advances in Artificial Systems for Medicine and Education III, 93-104, 2020
Synergistic effects of information and cybernetic interaction in civil aviation
Y Danik, R Hryschuk, S Gnatyuk
Aviation 20 (3), 137-144, 2016
Method of searching birationally equivalent Edwards curves over binary fields
Z Hu, S Gnatyuk, M Kovtun, N Seilova
Advances in Computer Science for Engineering and Education 13, 309-319, 2019
Adaptive Regulation of Radiated Power Radio Transmitting Devices in Modern Cellular Network Depending on Climatic Conditions
M Al Hadidi, JS Al-Azzeh, R Odarchenko, S Gnatyuk, A Abakumova
Contemporary Engineering Sciences 9 (10), 473-485, 2016
Кібернетична безпека держави: характерні ознаки та проблемні аспекти
ОГ Корченко, ВЛ Бурячок, СО Гнатюк
Науковий журнал" Безпека інформації", 2013
The system can't perform the operation now. Try again later.
Articles 1–20