|
|
Рядок 24: |
Рядок 24: |
| <tr style="background:white;"> | | <tr style="background:white;"> |
| <td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td> | | <td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td> |
− | <td style="text-align:center;">59</td> | + | <td style="text-align:center;">61</td> |
− | <td style="text-align:center;">12</td> | + | <td style="text-align:center;">13</td> |
− | <td>06.10.2023</td> | + | <td>27.11.2023</td> |
| </tr> | | </tr> |
| <tr style="background:white;"> | | <tr style="background:white;"> |
Рядок 32: |
Рядок 32: |
| <td style="text-align:center;">16</td> | | <td style="text-align:center;">16</td> |
| <td style="text-align:center;">3</td> | | <td style="text-align:center;">3</td> |
− | <td>12.10.2023</td> | + | <td>27.11.2023</td> |
| </tr> | | </tr> |
| <tr style="background:white;"> | | <tr style="background:white;"> |
| <td>[https://www.researchgate.net/profile/Vladimir_Sokolov8 Research Gate]</td> | | <td>[https://www.researchgate.net/profile/Vladimir_Sokolov8 Research Gate]</td> |
− | <td style="text-align:center;">79</td> | + | <td style="text-align:center;">80</td> |
| <td style="text-align:center;">10</td> | | <td style="text-align:center;">10</td> |
− | <td>12.10.2023</td> | + | <td>27.11.2023</td> |
| </tr> | | </tr> |
| <tr style="background:white;"> | | <tr style="background:white;"> |
| <td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td> | | <td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td> |
− | <td style="text-align:center;">131</td> | + | <td style="text-align:center;">137</td> |
− | <td style="text-align:center;">16</td> | + | <td style="text-align:center;">18</td> |
− | <td>12.10.2023</td> | + | <td>27.11.2023</td> |
| </tr> | | </tr> |
| </table> | | </table> |
Рядок 50: |
Рядок 50: |
| <table class="wikitable collapsible"> | | <table class="wikitable collapsible"> |
| <tr> | | <tr> |
− | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus, WOS</th> | + | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus і WOS</th> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Рядок 60: |
Рядок 60: |
| <tr> | | <tr> |
| <td style="white-space: nowrap;"> | | <td style="white-space: nowrap;"> |
− | <div>61<!-- ([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])--></div> | + | <div>62<!-- ([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])</div--> |
| + | </td> |
| + | <td style="white-space: nowrap;"> |
| + | <div>DOI: [https://doi.org/10.1109/ELIT61488.2023.10310815 10.1109/ELIT61488.2023.10310815]</div> |
| + | <!--div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85172739043 2-s2.0-85172739043]</div--> |
| + | </td> |
| + | <td>[https://ieeexplore.ieee.org/document/10310815 Bluetooth Low-Energy Beacon Resistance to Jamming Attack]</td> |
| + | <td>2023</td> |
| + | </tr> |
| + | <tr> |
| + | <td style="white-space: nowrap;"> |
| + | <div>61 ([http://elibrary.kubg.edu.ua/id/eprint/46792/ 46792])</div> |
| </td> | | </td> |
| <td style="white-space: nowrap;"> | | <td style="white-space: nowrap;"> |
− | <!--div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163896091 2-s2.0-85163896091]</div--> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85176926997 2-s2.0-85176926997]</div> |
| <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> |
| </td> | | </td> |
Рядок 71: |
Рядок 82: |
| <tr> | | <tr> |
| <td style="white-space: nowrap;"> | | <td style="white-space: nowrap;"> |
− | <div>60<!-- ([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])--></div> | + | <div>60 ([http://elibrary.kubg.edu.ua/id/eprint/46394/ 46394])</div> |
| </td> | | </td> |
| <td style="white-space: nowrap;"> | | <td style="white-space: nowrap;"> |
− | <!--div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163896091 2-s2.0-85163896091]</div--> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85175724530 2-s2.0-85175724530]</div> |
| <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> |
| </td> | | </td> |
Публікації у виданнях, що входять до наукометричних баз даних Scopus і WOS |
ID |
Indices |
Назва |
Рік |
|
</td>
| Bluetooth Low-Energy Beacon Resistance to Jamming Attack</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Method for Increasing the Various Sources Data Consistency for IoT Sensors</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Social Engineering Penetration Testing in Higher Education Institutions</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Brainwave-based Authentication using Features Fusion</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Smart Home Subsystem for Calculating the Quality of Public Utilities</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Implementation of Active Cybersecurity Education in Ukrainian Higher School</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Problematic Issues of the Accelerating Lens Deployment</td>
| 2023</td>
</tr>
|
52
</td>
|
</td>
| Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models</td>
| 2022</td>
</tr>
|
51
</td>
|
</td>
| Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Prototyping Methodology of End-to-End Speech Analytics Software</td>
| 2022</td>
</tr>
|
49
</td>
|
</td>
| Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network </td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Video Channel Suppression Method of Unmanned Aerial Vehicles</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Decentralized Access Demarcation System Construction in Situational Center Network</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Natural Language Technology to Ensure the Safety of Speech Information</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Stability Verification of Self-Organized Wireless Networks with Block Encryption</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Transferability Evaluation of Speech Emotion Recognition Between Different Languages</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Assessing Approaches of IT Infrastructure Audit</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Technology of Location Hiding by Spoofing the Mobile Operator IP Address</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Analysis of Automatic Speech Recognition Methods</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Last Mile Technique for Wireless Delivery System using an Accelerating Lens</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Wireless Sensors for Brain Activity — A Survey</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Implementation of Social Engineering Attack at Institution of Higher Education</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Experimental Evaluation of Phishing Attack on High School Students</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Metaphone Phonetic Algorithm for Ukrainian Last Names, Medicinal Names, and Toponyms</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Techniques Comparison for Natural Language Processing</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Bandwidth Research of Wireless IoT Switches</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Sustainability Research of the Secure Wireless Communication System with Channel Reservation</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Analysis of Implementation Results of the Distributed Access Control System</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Investigation of Availability of Wireless Access Points based on Embedded Systems</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Implementation of Active Learning in the Master’s Program on Cybersecurity</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Investigation of the IoT Device Lifetime with Secure Data Transmission</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Security Rating Metrics for Distributed Wireless Systems</td>
| 2019</td>
</tr>
|
4
</td>
|
</td>
| Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network</td>
| 2017</td>
</tr>
|
3
</td>
|
</td>
| Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane</td>
| 2017</td>
</tr>
|
2
</td>
|
</td>
| Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems</td>
| 2015</td>
</tr>
|
1
</td>
|
</td>
| Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11</td>
| 2013</td>
</tr>
</table>
Професійний розвиток
Захист кандидатської дисертації |
ID |
Науковий керівник |
Тема дисертації |
Наукова спеціальність, місце захисту |
Наукова спеціальність, місце, форма, роки навчання в аспірантурі |
Копія диплому |
Рік захисту |
63 |
Бурячок Володимир Леонідович, д.т.н., професор |
Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних |
05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ) |
05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008 |
|
2019 |
Викладацька діяльність
Рейтинг викладачів серед студентів |
ID |
Підрозділ |
Оцінка студентів |
Дата |
5455 |
Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка |
4,92 |
30.12.2022 |
4759 |
Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка |
4,96 |
28.12.2021 |
4053 |
Кафедра інформаційної та кібернетичної безпеки |
4,82 |
28.12.2020 |
2982 |
Кафедра інформаційної та кібернетичної безпеки |
4,74 |
28.12.2019 |
2290 |
Кафедра інформаційної та кібернетичної безпеки |
4,88 |
27.12.2018 |
|