Андрій Фесенко A.Fesenko
Андрій Фесенко A.Fesenko
Taras Shevchenko National University of Kyiv, Faculty of Information Technologies
Verified email at - Homepage
Cited by
Cited by
Experimental study of secure PRNG for Q-trits quantum cryptography protocols
S Gnatyuk, T Okhrimenko, O Azarenko, A Fesenko, R Berdibayev
2020 IEEE 11th International Conference on Dependable Systems, Services and …, 2020
Cyber security European standards in business
M Iavich, S Gnatyuk, G Fesenko
Scientific and practical cyber security journal, 2019
Comparison and Hybrid Implementation of Blowfish, Twofish and RSA Cryptosystems
M Iavich, S Gnatyuk, E Jintcharadze, Y Polishchuk, A Fesenko, ...
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering …, 2019
Cryptographic key exchange method for data factorial coding
ЕВ Фауре, АІ Щерба, ЄВ Васіліу, АО Фесенко
International Workshop on Cyber Hygiene (CybHyg-2019), Kyiv, Ukraine …, 2020
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State.
S Gnatyuk, V Sydorenko, A Polozhentsev, A Fesenko, N Akatayev, ...
COAPSN, 332-341, 2020
Security technique for authentication process in the cloud environment
O Oksiiuk, V Chaikovska, A Fesenko
2019 IEEE International Scientific-Practical Conference Problems of …, 2019
Основні біометричні характеристики, сучасні системи та технології біометричної аутентифікації
ВА Швець, АО Фесенко
Київ НАУ, 2013
Novel certification method for quantum random number generators
M Iavich, T Kuchukhidze, S Gnatyuk, A Fesenko
International Journal of Computer Network and Information Security 13 (3), 28-38, 2021
S Gnatyuk, M Iavich, G Iashvili, A Fesenko
Scientific and practical cyber security journal, 2019
Threat Hunting as a Method of Protection Against Cyber Threats.
N Lukova-Chuiko, A Fesenko, H Papirna, S Gnatyuk
IT&I, 103-113, 2020
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation.
V Sydorenko, S Gnatyuk, A Fesenko, Y Yevchenko, A Tolbatov, ...
ICTERI Workshops, 136-156, 2020
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare
S Gnatyuk, R Berdibayev, A Fesenko, O Kyryliuk, A Bessalov
Cybersecurity Providing in Information and Telecommunication Systems II 2021 …, 2021
Alternative Method of Cryptocurrency Wallets Managing.
G Omarov, D Dzhuruntayev, A Fesenko, S Umbet, S Dorozhynskyi
IT&I, 229-236, 2021
Improvement of Merkle signature scheme by means of optical quantum random number generators
M Iavich, A Gagnidze, G Iashvili, T Okhrimenko, A Arakelian, A Fesenko
International conference on computer science, engineering and education …, 2020
Review of modern quantum key distribution protocols
S Gnatyuk, T Okhrimenko, S Dorozhynskyy, A Fesenko
Sci Pract Cyber Secur J 4 (1), 56-60, 2020
Experimental Study of Information Technology for Detecting the Electronic Mass Media PR-effect based on Statistical Analysis.
O Hatyan, M Ryabyy, A Fesenko, V Kyschenko, M Bauyrzhan, A Petrov
COAPSN, 172-183, 2019
Методи обробки даних для систем ідентифікації та аутентифікації на основі біометричних характеристик ока
АО Фесенко
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment
M Iavich, G Iashvili, Z Avkurova, S Dorozhynskyi, A Fesenko
differences 1, 2, 2022
Passive Eavesdropping Attack of Several Intruders on Deterministic Protocol with Pairs of Entangled Qubits
Y Vasiliu, T Okhrimenko, A Fesenko, S Dorozhynskyy
2021 11th IEEE International Conference on Intelligent Data Acquisition and …, 2021
Diagnosis of Rail Circuits by Means of Fiber-Optic Cable
N Mgebrishvili, M Iavich, G Moiseev, N Kvachadze, A Fesenko, ...
International Conference on Computer Science, Engineering and Education …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20