|
|
Рядок 1: |
Рядок 1: |
| <div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px;"> | | <div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px;"> |
− | <div style="text-align:center;"><strong>2347</strong> балів (1-е місце) за 2023</div>
| |
− | <div style="text-align:center;"><strong>1933</strong> бали (2-е місце) за 2022</div>
| |
− | <div style="text-align:center;"><strong>982</strong> бали (9-е місце) за 2021</div>
| |
− | <div style="text-align:center;"><strong>1351</strong> бал (3-е місце) за 2020</div>
| |
− | <div style="text-align:center;"><strong>814</strong> балів (4-е місце) за 2019</<div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px;">
| |
| <div style="text-align:center;"><strong>2347</strong> балів (1-е місце) за 2023</div> | | <div style="text-align:center;"><strong>2347</strong> балів (1-е місце) за 2023</div> |
| <div style="text-align:center;"><strong>1933</strong> бали (2-е місце) за 2022</div> | | <div style="text-align:center;"><strong>1933</strong> бали (2-е місце) за 2022</div> |
Рядок 83: |
Рядок 78: |
| <td>[https://ceur-ws.org/Vol-3665/short1.pdf Tokenomics and Perspectives of Proof of Stake]</td> | | <td>[https://ceur-ws.org/Vol-3665/short1.pdf Tokenomics and Perspectives of Proof of Stake]</td> |
| <td>2024</td> | | <td>2024</td> |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>70 ([http://elibrary.kubg.edu.ua/id/eprint/48576/ 48576])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189143222 2-s2.0-85189143222]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3654/paper20.pdf Person-of-Interest Detection on Mobile Forensics Data—AI-Driven Roadmap]</td>
| |
− | <td>2024</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>69 ([http://elibrary.kubg.edu.ua/id/eprint/48575/ 48575])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189144731 2-s2.0-85189144731]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3654/paper9.pdf Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel]</td>
| |
− | <td>2024</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>68 ([http://elibrary.kubg.edu.ua/id/eprint/48628/ 48628])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/AICT61584.2023.10452421 10.1109/AICT61584.2023.10452421]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189553415 2-s2.0-85189553415]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/10452421 Wi-Fi Repeater Influence on Wireless Access]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>67 ([http://elibrary.kubg.edu.ua/id/eprint/48627/ 48627])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/AICT61584.2023.10452687 10.1109/AICT61584.2023.10452687]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189527228 2-s2.0-85189527228]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/10452687 Wi-Fi Interference Resistance to Jamming Attack ]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>66 ([http://elibrary.kubg.edu.ua/id/eprint/48321/ 48321])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/UkrMiCo61577.2023.10380360 10.1109/UkrMiCo61577.2023.10380360]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85183457098 2-s2.0-85183457098]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/10380360 ZigBee Network Resistance to Jamming Attacks]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>65 ([http://elibrary.kubg.edu.ua/id/eprint/47365/ 47365])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178338434 2-s2.0-85178338434]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3550/short7.pdf Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentral-izing the Telecommunications Network]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>64 ([http://elibrary.kubg.edu.ua/id/eprint/47363/ 47363])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178378792 2-s2.0-85178378792]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3550/short6.pdf Properties of Isogeny Graph of Non-Cyclic Edwards Curves]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>63 ([http://elibrary.kubg.edu.ua/id/eprint/47512/ 47512])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/CSIT61576.2023.10324031 10.1109/CSIT61576.2023.10324031]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179844674 2-s2.0-85179844674]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/10324031 Jump-Stay Jamming Attack on Wi-Fi Systems]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>62 ([http://elibrary.kubg.edu.ua/id/eprint/46982/ 46982])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/ELIT61488.2023.10310815 10.1109/ELIT61488.2023.10310815]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179520418 2-s2.0-85179520418]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/10310815 Bluetooth Low-Energy Beacon Resistance to Jamming Attack]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>61 ([http://elibrary.kubg.edu.ua/id/eprint/46792/ 46792])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85176926997 2-s2.0-85176926997]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3530/paper11.pdf Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>60 ([http://elibrary.kubg.edu.ua/id/eprint/46394/ 46394])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85175724530 2-s2.0-85175724530]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3504/paper2.pdf Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>59 ([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST57299.2022.10238518 10.1109/PICST57299.2022.10238518]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85172739043 2-s2.0-85172739043]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/10238518 Method for Increasing the Various Sources Data Consistency for IoT Sensors]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>58 ([http://elibrary.kubg.edu.ua/id/eprint/45924/ 45924])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-031-36118-0_96 10.1007/978-3-031-36118-0_96]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85169039263 2-s2.0-85169039263]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007/978-3-031-36118-0_96 Social Engineering Penetration Testing in Higher Education Institutions]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>57 ([http://elibrary.kubg.edu.ua/id/eprint/44602/ 44602])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1016/j.cose.2023.103198 10.1016/j.cose.2023.103198]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85150928741 2-s2.0-85150928741] (Q1)</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:001053816800001 WOS:001053816800001] (Q1)</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/0167-4048 0167-4048]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1872-6208 1872-6208]</div>
| |
− | </td>
| |
− | <td>[https://www.sciencedirect.com/science/article/pii/S0167404823001086 Brainwave-based Authentication using Features Fusion]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>56 ([http://elibrary.kubg.edu.ua/id/eprint/45692/ 45692])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163896091 2-s2.0-85163896091]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3421/short1.pdf Smart Home Subsystem for Calculating the Quality of Public Utilities]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>55 ([http://elibrary.kubg.edu.ua/id/eprint/45691/ 45691])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163882231 2-s2.0-85163882231]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3421/paper4.pdf CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>54 ([http://elibrary.kubg.edu.ua/id/eprint/45656/ 45656])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-031-35467-0_32 10.1007/978-3-031-35467-0_32]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85162953358 2-s2.0-85162953358]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007/978-3-031-35467-0_32 Implementation of Active Cybersecurity Education in Ukrainian Higher School]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>53 ([http://elibrary.kubg.edu.ua/id/eprint/43770/ 43770])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/UkrMW58013.2022.10037124 10.1109/UkrMW58013.2022.10037124]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85149175780 2-s2.0-85149175780]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:001058645700077 WOS:001058645700077]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/abstract/document/10037124 Problematic Issues of the Accelerating Lens Deployment]</td>
| |
− | <td>2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>52 ([http://elibrary.kubg.edu.ua/id/eprint/43769/ 43769])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145368917 2-s2.0-85145368917] (Q4)</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div>
| |
− | </td>
| |
− | <td>[http://www.jatit.org/volumes/Vol100No24/18Vol100No24.pdf Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>51 ([http://elibrary.kubg.edu.ua/id/eprint/43768/ 43768])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145479763 2-s2.0-85145479763] (Q4)</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div>
| |
− | </td>
| |
− | <td>[http://www.jatit.org/volumes/Vol100No24/15Vol100No24.pdf Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>50 ([http://elibrary.kubg.edu.ua/id/eprint/43756/ 43756])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85146116195 2-s2.0-85146116195]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3312/paper6.pdf Prototyping Methodology of End-to-End Speech Analytics Software]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>49 ([http://elibrary.kubg.edu.ua/id/eprint/43156/ 43156])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143412570 2-s2.0-85143412570] (Q4)</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div>
| |
− | </td>
| |
− | <td>[http://www.jatit.org/volumes/Vol100No22/18Vol100No22.pdf Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>48 ([http://elibrary.kubg.edu.ua/id/eprint/43202/ 43202])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143791399 2-s2.0-85143791399]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3288/short13.pdf Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>47 ([http://elibrary.kubg.edu.ua/id/eprint/43188/ 43188])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143809498 2-s2.0-85143809498]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[https://ceur-ws.org/Vol-3288/paper1.pdf Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>46 ([http://elibrary.kubg.edu.ua/id/eprint/43154/ 43154])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/ELNANO54667.2022.9927105 10.1109/ELNANO54667.2022.9927105]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85142604882 2-s2.0-85142604882]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2377-6935 2377-6935]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2693-3535 2693-3535]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9927105 Video Channel Suppression Method of Unmanned Aerial Vehicles]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>45 ([http://elibrary.kubg.edu.ua/id/eprint/41953/ 41953])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137151000 2-s2.0-85137151000]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3188/short10.pdf Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>44 ([http://elibrary.kubg.edu.ua/id/eprint/41951/ 41951])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139416 2-s2.0-85137139416]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3188/paper18.pdf Decentralized Access Demarcation System Construction in Situational Center Network]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>43 ([http://elibrary.kubg.edu.ua/id/eprint/41867/ 41867])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137145539 2-s2.0-85137145539]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3187/short10.pdf Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>42 ([http://elibrary.kubg.edu.ua/id/eprint/41803/ 41803])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139799 2-s2.0-85137139799]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3187/paper20.pdf Natural Language Technology to Ensure the Safety of Speech Information]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>41 ([http://elibrary.kubg.edu.ua/id/eprint/41337/ 41337])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132243825 2-s2.0-85132243825]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3149/short11.pdf Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>40 ([http://elibrary.kubg.edu.ua/id/eprint/41336/ 41336])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132269263 2-s2.0-85132269263]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3149/short8.pdf Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>39 ([http://elibrary.kubg.edu.ua/id/eprint/41190/ 41190])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.32782/cmis/3137-19 10.32782/cmis/3137-19]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130712118 2-s2.0-85130712118]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-3137/paper19.pdf Stability Verification of Self-Organized Wireless Networks with Block Encryption]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>38 ([http://elibrary.kubg.edu.ua/id/eprint/41098/ 41098])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-031-04809-8_53 10.1007/978-3-031-04809-8_53]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129657396 2-s2.0-85129657396]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007/978-3-031-04809-8_53 Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>37 ([http://elibrary.kubg.edu.ua/id/eprint/41097/ 41097])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-031-04812-8_35 10.1007/978-3-031-04812-8_35]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129602152 2-s2.0-85129602152]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007/978-3-031-04812-8_35 Transferability Evaluation of Speech Emotion Recognition Between Different Languages]</td>
| |
− | <td>2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>36 ([http://elibrary.kubg.edu.ua/id/eprint/41217/ 41217])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST54195.2021.9772181 10.1109/PICST54195.2021.9772181]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130949573 2-s2.0-85130949573]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9772181 Assessing Approaches of IT Infrastructure Audit]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>35 ([http://elibrary.kubg.edu.ua/id/eprint/41216/ 41216])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST54195.2021.9772161 10.1109/PICST54195.2021.9772161]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130900011 2-s2.0-85130900011]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9772161 Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>34 ([http://elibrary.kubg.edu.ua/id/eprint/39482/ 39482])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120713598 2-s2.0-85120713598]</div>
| |
− | </td>
| |
− | <td>Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>33 ([http://elibrary.kubg.edu.ua/id/eprint/39481/ 39481])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120677459 2-s2.0-85120677459]</div>
| |
− | </td>
| |
− | <td>On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>32 ([http://elibrary.kubg.edu.ua/id/eprint/40895/ 40895])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/UkrMiCo52950.2021.9716700 10.1109/UkrMiCo52950.2021.9716700]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126945180 2-s2.0-85126945180]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9716700 Technology of Location Hiding by Spoofing the Mobile Operator IP Address]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>31 ([http://elibrary.kubg.edu.ua/id/eprint/40894/ 40894])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/UkrMiCo52950.2021.9716665 10.1109/UkrMiCo52950.2021.9716665]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126958490 2-s2.0-85126958490]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9716665 Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>30 ([http://elibrary.kubg.edu.ua/id/eprint/36995/ 36995])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112360373 2-s2.0-85112360373]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2923/paper27.pdf Analysis of Automatic Speech Recognition Methods]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>29 ([http://elibrary.kubg.edu.ua/id/eprint/36994/ 36994])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112376265 2-s2.0-85112376265]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2923/paper1.pdf Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>28 ([http://elibrary.kubg.edu.ua/id/eprint/36975/ 36975])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-030-80472-5_31 10.1007/978-3-030-80472-5_31]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85111924795 2-s2.0-85111924795]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2194-5365 2194-5365]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_31 Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>27 ([http://elibrary.kubg.edu.ua/id/eprint/36974/ 36974])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-030-80472-5_3 10.1007/978-3-030-80472-5_3]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85111941280 2-s2.0-85111941280]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2194-5365 2194-5365]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_3 Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition]</td>
| |
− | <td>2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>26 ([http://elibrary.kubg.edu.ua/id/eprint/37097/ 37097])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST51311.2020.9468084 10.1109/PICST51311.2020.9468084]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114396341 2-s2.0-85114396341]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9468084 Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>25 ([http://elibrary.kubg.edu.ua/id/eprint/37096/ 37096])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST51311.2020.9467886 10.1109/PICST51311.2020.9467886]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114397136 2-s2.0-85114397136]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9467886 Last Mile Technique for Wireless Delivery System using an Accelerating Lens]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>24 ([http://elibrary.kubg.edu.ua/id/eprint/33888/ 33888])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.3390/electronics9122092 10.3390/electronics9122092]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097402923 2-s2.0-85097402923] (Q2)</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000602048000001 WOS:000602048000001] (Q2)</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2079-9292 2079-9292]</div>
| |
− | </td>
| |
− | <td>[https://www.mdpi.com/2079-9292/9/12/2092 Wireless Sensors for Brain Activity — A Survey]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>23 ([http://elibrary.kubg.edu.ua/id/eprint/34017/ 34017])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/ukrmw49653.2020.9252755 10.1109/ukrmw49653.2020.9252755]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097710865 2-s2.0-85097710865]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9252755 Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>22 ([http://elibrary.kubg.edu.ua/id/eprint/33908/ 33908])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096935822 2-s2.0-85096935822]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800001 WOS:000651092800001]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2746/paper1.pdf Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>21 ([http://elibrary.kubg.edu.ua/id/eprint/31886/ 31886])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096946608 2-s2.0-85096946608]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800003 WOS:000651092800003]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2746/paper3.pdf Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>20 ([http://elibrary.kubg.edu.ua/id/eprint/31886/ 31886])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.5281/zenodo.3994103 10.5281/zenodo.3994103]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85091320429 2-s2.0-85091320429]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2654/paper12.pdf Implementation of Social Engineering Attack at Institution of Higher Education]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>19 ([http://elibrary.kubg.edu.ua/id/eprint/31678/ 31678])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-030-55506-1_59 10.1007/978-3-030-55506-1_59]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85089721650 2-s2.0-85089721650]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-55506-1_59 Experimental Evaluation of Phishing Attack on High School Students]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>18 ([http://elibrary.kubg.edu.ua/id/eprint/31677/ 31677])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-030-55506-1_47 10.1007/978-3-030-55506-1_47]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85089719737 2-s2.0-85089719737]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-55506-1_47 Metaphone Phonetic Algorithm for Ukrainian Last Names, Medicinal Names, and Toponyms]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>17 ([http://elibrary.kubg.edu.ua/id/eprint/31628/ 31628])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.5281/zenodo.3895814 10.5281/zenodo.3895814]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088881294 2-s2.0-85088881294]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800005 WOS:000664104800005]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2631/paper5.pdf Techniques Comparison for Natural Language Processing]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>16 ([http://elibrary.kubg.edu.ua/id/eprint/31627/ 31627])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.5281/zenodo.3929541 10.5281/zenodo.3929541]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088879005 2-s2.0-85088879005]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800003 WOS:000664104800003]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2631/paper3.pdf Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>15 ([http://elibrary.kubg.edu.ua/id/eprint/31575/ 31575])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-030-43070-2_29 10.1007/978-3-030-43070-2_29]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85087214225 2-s2.0-85087214225]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-43070-2_29 Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>14 ([http://elibrary.kubg.edu.ua/id/eprint/31517/ 31517])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235492 10.1109/TCSET49122.2020.235492]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086312920 2-s2.0-85086312920]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000113 WOS:000578041000113]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9088628/ Bandwidth Research of Wireless IoT Switches]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>13 ([http://elibrary.kubg.edu.ua/id/eprint/31518/ 31518])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235583 10.1109/TCSET49122.2020.235583]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086313460 2-s2.0-85086313460]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000204 WOS:000578041000204]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9088514/ Sustainability Research of the Secure Wireless Communication System with Channel Reservation]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>12 ([http://elibrary.kubg.edu.ua/id/eprint/31519/ 31519])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST47496.2019.9061376 10.1109/PICST47496.2019.9061376]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85083654177 2-s2.0-85083654177]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9061376/ Analysis of Implementation Results of the Distributed Access Control System]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>11 ([http://elibrary.kubg.edu.ua/id/eprint/31520/ 31520])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/PICST47496.2019.9061551 10.1109/PICST47496.2019.9061551]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85083675874 2-s2.0-85083675874]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/9061551/ Investigation of Availability of Wireless Access Points based on Embedded Systems]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>10 ([http://elibrary.kubg.edu.ua/id/eprint/27219/ 27219])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1007/978-3-030-16621-2_57 10.1007/978-3-030-16621-2_57]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85064552966 2-s2.0-85064552966]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-16621-2_57 Implementation of Active Learning in the Master’s Program on Cybersecurity]</td>
| |
− | <td>2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>9 ([http://elibrary.kubg.edu.ua/id/eprint/29410/ 29410])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.15587/1729-4061.2019.181943 10.15587/1729-4061.2019.181943]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85075389262 2-s2.0-85075389262] (Q2)</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1729-4061 1729-4061]</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/1729-3774 1729-3774]</div>
| |
− | </td>
| |
− | <td>[http://journals.uran.ua/eejet/article/view/181943 Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>8 ([http://elibrary.kubg.edu.ua/id/eprint/27984/ 27984])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.28925/2663-4023.2019.4.90103 10.28925/2663-4023.2019.4.90103]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85072951424 2-s2.0-85072951424]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000565635700002 WOS:000565635700002] (Q4)</div>
| |
− | <div>pISSN: [https://portal.issn.org/resource/ISSN/0302-9743 0302-9743]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1611-3349 1611-3349]</div>
| |
− | </td>
| |
− | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-30859-9_2 Investigation of the IoT Device Lifetime with Secure Data Transmission]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>7 ([http://elibrary.kubg.edu.ua/id/eprint/26822/ 26822])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/infocommst.2018.8632151 10.1109/INFOCOMMST.2018.8632151]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85062891053 2-s2.0-85062891053]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000458659100109 WOS:000458659100109]</div>
| |
− | </td>
| |
− | <td>[https://ieeexplore.ieee.org/document/8632151/ Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>6 ([http://elibrary.kubg.edu.ua/id/eprint/27704/ 27704])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.2139/ssrn.3455453 10.2139/ssrn.3455453]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068084320 2-s2.0-85068084320]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100021 WOS:000664097100021]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1556-5068 1556-5068]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2386/paper21.pdf Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>5 ([http://elibrary.kubg.edu.ua/id/eprint/27702/ 27702])</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.5281/zenodo.3256219 10.5281/zenodo.3256219]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068053861 2-s2.0-85068053861]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100017 WOS:000664097100017]</div>
| |
− | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
| |
− | </td>
| |
− | <td>[http://ceur-ws.org/Vol-2386/paper17.pdf Security Rating Metrics for Distributed Wireless Systems]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>4</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/infocommst.2017.8246463 10.1109/INFOCOMMST.2017.8246463]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85046096370 2-s2.0-85046096370]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000426514100127 WOS:000426514100127]</div>
| |
− | </td>
| |
− | <td>[http://ieeexplore.ieee.org/document/8246463/ Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network]</td>
| |
− | <td>2017</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>3</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/ICATT.2017.7972671 10.1109/ICATT.2017.7972671]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85027453269 2-s2.0-85027453269]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000426507800086 WOS:000426507800086]</div>
| |
− | </td>
| |
− | <td>[http://ieeexplore.ieee.org/document/7972671/ Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane]</td>
| |
− | <td>2017</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>2</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/ICATT.2015.7136852 10.1109/ICATT.2015.7136852]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84939458540 2-s2.0-84939458540]</div>
| |
− | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000381609800077 WOS:000381609800077]</div>
| |
− | </td>
| |
− | <td>[http://ieeexplore.ieee.org/document/7136852/ Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems]</td>
| |
− | <td>2015</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>1</div>
| |
− | </td>
| |
− | <td style="white-space: nowrap;">
| |
− | <div>DOI: [https://doi.org/10.1109/ICATT.2013.6650715 10.1109/ICATT.2013.6650715]</div>
| |
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84898619015 2-s2.0-84898619015]</div>
| |
− | </td>
| |
− | <td>[http://ieeexplore.ieee.org/document/6650715/ Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11]</td>
| |
− | <td>2013</td>
| |
− | </tr>
| |
− | </table>
| |
− |
| |
− | ==Професійний розвиток==
| |
− |
| |
− | <table class="wikitable collapsible">
| |
− | <tr>
| |
− | <th colspan="7" style="text-align:left">Захист кандидатської дисертації</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <th>ID</th>
| |
− | <th>Науковий керівник</th>
| |
− | <th>Тема дисертації</th>
| |
− | <th>Наукова спеціальність, місце захисту</th>
| |
− | <th>Наукова спеціальність, місце, форма, роки навчання в аспірантурі</th>
| |
− | <th>Копія диплому</th>
| |
− | <th>Рік захисту</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>63</td>
| |
− | <td>Бурячок Володимир Леонідович, д.т.н., професор</td>
| |
− | <td>Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних</td>
| |
− | <td>05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ)</td>
| |
− | <td>05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008</td>
| |
− | <td class="image250">http://rg.kubg.edu.ua/data/dynamicdb/employees_candidate_committee/63/1612_191224110825_001.jpg</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | </table>
| |
− |
| |
− | ==Викладацька діяльність==
| |
− |
| |
− | <table class="wikitable collapsible">
| |
− | <tr>
| |
− | <th colspan="3" style="text-align:left">Підручники, навчальні посібники (колективні)</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <th width="1%">ID</th>
| |
− | <th>Назва</th>
| |
− | <th>Рік</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>27294</td>
| |
− | <td>[http://elibrary.kubg.edu.ua/id/eprint/27294 Безпека безпровідних і мобільних мереж]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>27191</td>
| |
− | <td>[http://elibrary.kubg.edu.ua/id/eprint/27191 Технології забезпечення безпеки мережевої інфраструктури]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | </table>
| |
− |
| |
− | <table class="wikitable collapsible">
| |
− | <tr>
| |
− | <th colspan="3" style="text-align:left">Навчальні та методичні матеріали</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <th width="1%">ID</th>
| |
− | <th>Назва</th>
| |
− | <th>Рік</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>27053</td>
| |
− | <td>[http://elibrary.kubg.edu.ua/id/eprint/27053 Ініціатива CDIO]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>29432</td>
| |
− | <td>[http://elibrary.kubg.edu.ua/id/eprint/29432 Керівництво по eduScrum. Правила гри]</td>
| |
− | <td>2019</td>
| |
− | </tr>
| |
− | </table>
| |
− |
| |
− | <table class="wikitable collapsible">
| |
− | <tr>
| |
− | <th colspan="4" style="text-align:left">Рейтинг викладачів серед студентів</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <th>ID</th>
| |
− | <th>Підрозділ</th>
| |
− | <th>Оцінка студентів</th>
| |
− | <th>Дата</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>6339</td>
| |
− | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td>
| |
− | <td style="text-align:center;">4,76</td>
| |
− | <td>30.12.2023</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>5455</td>
| |
− | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td>
| |
− | <td style="text-align:center;">4,92</td>
| |
− | <td>30.12.2022</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>4759</td>
| |
− | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td>
| |
− | <td style="text-align:center;">4,96</td>
| |
− | <td>28.12.2021</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>4053</td>
| |
− | <td>Кафедра інформаційної та кібернетичної безпеки</td>
| |
− | <td style="text-align:center;">4,82</td>
| |
− | <td>28.12.2020</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>2982</td>
| |
− | <td>Кафедра інформаційної та кібернетичної безпеки</td>
| |
− | <td style="text-align:center;">4,74</td>
| |
− | <td>28.12.2019</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>2290</td>
| |
− | <td>Кафедра інформаційної та кібернетичної безпеки</td>
| |
− | <td style="text-align:center;">4,88</td>
| |
− | <td>27.12.2018</td>
| |
− | </tr>
| |
− | </table>div>
| |
− | <div style="text-align:center;"><strong>103</strong> бали (172-е місце) за 2018</div>
| |
− | <div style="text-align:center; padding-top: 10px;">[[File:orcid.png|24px]] [http://orcid.org/0000-0002-9349-7946 orcID] [[File:email_s.png|24px]] [mailto:v.sokolov@kubg.edu.ua Пошта]</div>
| |
− | </div>
| |
− |
| |
− | ==Науково-дослідницька діяльність==
| |
− |
| |
− | <table class="wikitable collapsible">
| |
− | <tr>
| |
− | <th colspan="4" style="text-align:left">Індекси цитування</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <th>Джерело</th>
| |
− | <th>Бібліографічні посилання</th>
| |
− | <th>h-індекс</th>
| |
− | <th>Дата</th>
| |
− | </tr>
| |
− | <tr style="background:white;">
| |
− | <td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td>
| |
− | <td style="text-align:center;">71</td>
| |
− | <td style="text-align:center;">18</td>
| |
− | <td>12.04.2024</td>
| |
− | </tr>
| |
− | <tr style="background:white;">
| |
− | <td>[https://www.webofscience.com/wos/author/record/400301 WoS]</td>
| |
− | <td style="text-align:center;">16</td>
| |
− | <td style="text-align:center;">3</td>
| |
− | <td>06.04.2024</td>
| |
− | </tr>
| |
− | <tr style="background:white;">
| |
− | <td>[https://www.researchgate.net/profile/Volodymyr-Sokolov-2 Research Gate]</td>
| |
− | <td style="text-align:center;">103</td>
| |
− | <td style="text-align:center;">12</td>
| |
− | <td>06.04.2024</td>
| |
− | </tr>
| |
− | <tr style="background:white;">
| |
− | <td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td>
| |
− | <td style="text-align:center;">146</td>
| |
− | <td style="text-align:center;">20</td>
| |
− | <td>06.04.2024</td>
| |
− | </tr>
| |
− | </table>
| |
− |
| |
− | <table class="wikitable collapsible">
| |
− | <tr>
| |
− | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus і WoS</th>
| |
− | </tr>
| |
− | <tr>
| |
− | <th width="1%">ID</th>
| |
− | <th width="1%">Indices</th>
| |
− | <th>Назва</th>
| |
− | <th>Рік</th>
| |
| </tr> | | </tr> |
| <tr> | | <tr> |