Відмінності між версіями «Соколов Володимир Юрійович»

Матеріал з Київський столичний університет імені Бориса Грінченки
Перейти до: навігація, пошук
(змінилися посилання)
(не показано 115 проміжних версій цього учасника)
Рядок 1: Рядок 1:
<div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px; padding-bottom:0;">
+
<div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px;">
    <div style="text-align:center;font-weight:bold;">Соколов Володимир Юрійович</div>
+
<div style="text-align:center;"><strong>2347</strong> балів (1-е місце) за 2023</div>
    <div style="margin-left:30px;">
+
<div style="text-align:center;"><strong>1933</strong> бали (2-е місце) за 2022</div>
[[File:orcid.png|24px]] [http://orcid.org/0000-0002-9349-7946 orcID]
+
<div style="text-align:center;"><strong>982</strong> бали (9-е місце) за 2021</div>
 
+
<div style="text-align:center;"><strong>1351</strong> бал (3-е місце) за 2020</div>
[[File:researcherid.png|24px]] [http://www.researcherid.com/rid/O-2333-2017 researcherID]
+
<div style="text-align:center;"><strong>814</strong> балів (4-е місце) за 2019</div>
 
+
<div style="text-align:center;"><strong>103</strong> бали (172-е місце) за 2018</div>
[[File:scopus.png|24px]] [https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]
+
<div style="text-align:center; padding-top: 10px;">[[File:orcid.png|24px]] [http://orcid.org/0000-0002-9349-7946 orcID] [[File:email_s.png|24px]] [mailto:v.sokolov@kubg.edu.ua Пошта]</div>
 
+
[[File:schoolar_s.png|24px]] [https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]
+
 
+
[[File:email_s.png|24px]] [mailto:v.sokolov@kugb.edu.ua Пошта]
+
    </div>
+
 
</div>
 
</div>
  
Рядок 17: Рядок 12:
  
 
<table class="wikitable collapsible">
 
<table class="wikitable collapsible">
    <tr><th colspan="5" style="text-align:left">Індекси цитування Google Академії</th></tr>
 
 
<tr>
 
<tr>
    <th>Бібліографічні посилання</th>
+
<th colspan="4" style="text-align:left">Індекси цитування</th>
 +
</tr>
 +
<tr>
 +
<th>Джерело</th>
 +
<th>Бібліографічні посилання</th>
 
<th>h-індекс</th>
 
<th>h-індекс</th>
<th>Дата оновлення</th>
+
<th>Дата</th>
 
</tr>
 
</tr>
 
<tr style="background:white;">
 
<tr style="background:white;">
    <td>15</td>
+
<td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td>
<td>2</td>
+
<td style="text-align:center;">73</td>
<td> 2018.09.12 15:20:17</td>
+
<td style="text-align:center;">18</td>
 +
<td>04.05.2024</td>
 +
</tr>
 +
<tr style="background:white;">
 +
<td>[https://www.webofscience.com/wos/author/record/400301 WoS]</td>
 +
<td style="text-align:center;">16</td>
 +
<td style="text-align:center;">4</td>
 +
<td>13.06.2024</td>
 +
</tr>
 +
<tr style="background:white;">
 +
<td>[https://www.researchgate.net/profile/Volodymyr-Sokolov-2 Research Gate]</td>
 +
<td style="text-align:center;">103</td>
 +
<td style="text-align:center;">12</td>
 +
<td>06.04.2024</td>
 +
</tr>
 +
<tr style="background:white;">
 +
<td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td>
 +
<td style="text-align:center;">146</td>
 +
<td style="text-align:center;">20</td>
 +
<td>06.04.2024</td>
 
</tr>
 
</tr>
 
</table>
 
</table>
  
 
<table class="wikitable collapsible">
 
<table class="wikitable collapsible">
    <tr><th colspan="3" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus, WOS</th></tr>
 
    <tr>
 
        <th width="10%">IDs</th>
 
        <th>Назва</th>
 
        <th>Рік</th>
 
    </tr>
 
 
<tr>
 
<tr>
    <td>
+
<th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus і WoS</th>
DOI:&nbsp;[https://doi.org/10.1109/infocommst.2017.8246463 10.1109/INFOCOMMST.2017.8246463]<br />
+
</tr>
EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85046096370 2-s2.0-85046096370]<br />
+
<tr>
ISI:&nbsp;[http://apps.webofknowledge.com/InboundService.do?product=WOS&action=retrieve&mode=FullRecord&UT=000426514100127 000426514100127]<br />
+
<th width="1%">ID</th>
INSPEC:&nbsp;17484933<br />
+
<th width="1%">Indices</th>
DiVA2:&nbsp;[http://bth.diva-portal.org/smash/record.jsf?pid=diva2%3A1190348 1190348]<br />
+
<th>Назва</th>
IEEE:&nbsp;[http://ieeexplore.ieee.org/document/8246463/ 8246463]<br />
+
<th>Рік</th>
ISBN:&nbsp;[http://www.worldcat.org/isbn/9781538609835 978-1-5386-0983-5]
+
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>72&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48727/ 48727])</div>
 
</td>
 
</td>
<td>[http://elibrary.kubg.edu.ua/id/eprint/24651/ Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network]</td>
+
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85191434425 2-s2.0-85191434425]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3665/short6.pdf Methodology for Choosing a Consensus Algorithm for Blockchain Technology]</td>
 +
<td>2024</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>71&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48729/ 48729])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85191421388 2-s2.0-85191421388]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3665/short1.pdf Tokenomics and Perspectives of Proof of Stake]</td>
 +
<td>2024</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>70&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48576/ 48576])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189143222 2-s2.0-85189143222]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3654/paper20.pdf Person-of-Interest Detection on Mobile Forensics Data—AI-Driven Roadmap]</td>
 +
<td>2024</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>69&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48575/ 48575])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189144731 2-s2.0-85189144731]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3654/paper9.pdf Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel]</td>
 +
<td>2024</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>68&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48628/ 48628])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/AICT61584.2023.10452421 10.1109/AICT61584.2023.10452421]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189553415 2-s2.0-85189553415]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/10452421 Wi-Fi Repeater Influence on Wireless Access]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>67&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48627/ 48627])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/AICT61584.2023.10452687 10.1109/AICT61584.2023.10452687]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189527228 2-s2.0-85189527228]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/10452687 Wi-Fi Interference Resistance to Jamming Attack ]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>66&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/48321/ 48321])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/UkrMiCo61577.2023.10380360 10.1109/UkrMiCo61577.2023.10380360]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85183457098 2-s2.0-85183457098]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/10380360 ZigBee Network Resistance to Jamming Attacks]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>65&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/47365/ 47365])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178338434 2-s2.0-85178338434]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3550/short7.pdf Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentral-izing the Telecommunications Network]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>64&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/47363/ 47363])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178378792 2-s2.0-85178378792]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3550/short6.pdf Properties of Isogeny Graph of Non-Cyclic Edwards Curves]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>63&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/47512/ 47512])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/CSIT61576.2023.10324031 10.1109/CSIT61576.2023.10324031]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179844674 2-s2.0-85179844674]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/10324031 Jump-Stay Jamming Attack on Wi-Fi Systems]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>62&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/46982/ 46982])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/ELIT61488.2023.10310815 10.1109/ELIT61488.2023.10310815]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179520418 2-s2.0-85179520418]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/10310815 Bluetooth Low-Energy Beacon Resistance to Jamming Attack]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>61&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/46792/ 46792])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85176926997 2-s2.0-85176926997]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3530/paper11.pdf Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>60&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/46394/ 46394])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85175724530 2-s2.0-85175724530]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3504/paper2.pdf Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>59&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST57299.2022.10238518 10.1109/PICST57299.2022.10238518]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85172739043 2-s2.0-85172739043]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/10238518 Method for Increasing the Various Sources Data Consistency for IoT Sensors]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>58&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/45924/ 45924])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-031-36118-0_96 10.1007/978-3-031-36118-0_96]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85169039263 2-s2.0-85169039263]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007/978-3-031-36118-0_96 Social Engineering Penetration Testing in Higher Education Institutions]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>57&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/44602/ 44602])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1016/j.cose.2023.103198 10.1016/j.cose.2023.103198]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85150928741 2-s2.0-85150928741] (Q1)</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:001053816800001 WOS:001053816800001] (Q1)</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/0167-4048 0167-4048]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1872-6208 1872-6208]</div>
 +
</td>
 +
<td>[https://www.sciencedirect.com/science/article/pii/S0167404823001086 Brainwave-based Authentication using Features Fusion]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>56&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/45692/ 45692])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163896091 2-s2.0-85163896091]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3421/short1.pdf Smart Home Subsystem for Calculating the Quality of Public Utilities]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>55&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/45691/ 45691])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163882231 2-s2.0-85163882231]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3421/paper4.pdf CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>54&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/45656/ 45656])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-031-35467-0_32 10.1007/978-3-031-35467-0_32]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85162953358 2-s2.0-85162953358]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007/978-3-031-35467-0_32 Implementation of Active Cybersecurity Education in Ukrainian Higher School]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>53&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43770/ 43770])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/UkrMW58013.2022.10037124 10.1109/UkrMW58013.2022.10037124]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85149175780 2-s2.0-85149175780]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:001058645700077 WOS:001058645700077]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/abstract/document/10037124 Problematic Issues of the Accelerating Lens Deployment]</td>
 +
<td>2023</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>52&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43769/ 43769])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145368917 2-s2.0-85145368917] (Q4)</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div>
 +
</td>
 +
<td>[http://www.jatit.org/volumes/Vol100No24/18Vol100No24.pdf Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>51&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43768/ 43768])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145479763 2-s2.0-85145479763] (Q4)</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div>
 +
</td>
 +
<td>[http://www.jatit.org/volumes/Vol100No24/15Vol100No24.pdf Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>50&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43756/ 43756])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85146116195 2-s2.0-85146116195]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3312/paper6.pdf Prototyping Methodology of End-to-End Speech Analytics Software]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>49&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43156/ 43156])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143412570 2-s2.0-85143412570] (Q4)</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div>
 +
</td>
 +
<td>[http://www.jatit.org/volumes/Vol100No22/18Vol100No22.pdf Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>48&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43202/ 43202])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143791399 2-s2.0-85143791399]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3288/short13.pdf Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>47&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43188/ 43188])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143809498 2-s2.0-85143809498]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[https://ceur-ws.org/Vol-3288/paper1.pdf Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>46&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/43154/ 43154])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/ELNANO54667.2022.9927105 10.1109/ELNANO54667.2022.9927105]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85142604882 2-s2.0-85142604882]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2377-6935 2377-6935]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2693-3535 2693-3535]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9927105 Video Channel Suppression Method of Unmanned Aerial Vehicles]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>45&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41953/ 41953])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137151000 2-s2.0-85137151000]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3188/short10.pdf Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>44&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41951/ 41951])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139416 2-s2.0-85137139416]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3188/paper18.pdf Decentralized Access Demarcation System Construction in Situational Center Network]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>43&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41867/ 41867])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137145539 2-s2.0-85137145539]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3187/short10.pdf Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>42&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41803/ 41803])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139799 2-s2.0-85137139799]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3187/paper20.pdf Natural Language Technology to Ensure the Safety of Speech Information]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>41&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41337/ 41337])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132243825 2-s2.0-85132243825]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3149/short11.pdf Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>40&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41336/ 41336])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132269263 2-s2.0-85132269263]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3149/short8.pdf Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>39&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41190/ 41190])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.32782/cmis/3137-19 10.32782/cmis/3137-19]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130712118 2-s2.0-85130712118]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-3137/paper19.pdf Stability Verification of Self-Organized Wireless Networks with Block Encryption]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>38&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41098/ 41098])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-031-04809-8_53 10.1007/978-3-031-04809-8_53]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129657396 2-s2.0-85129657396]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007/978-3-031-04809-8_53 Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>37&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41097/ 41097])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-031-04812-8_35 10.1007/978-3-031-04812-8_35]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129602152 2-s2.0-85129602152]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007/978-3-031-04812-8_35 Transferability Evaluation of Speech Emotion Recognition Between Different Languages]</td>
 +
<td>2022</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>36&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41217/ 41217])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST54195.2021.9772181 10.1109/PICST54195.2021.9772181]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130949573 2-s2.0-85130949573]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9772181 Assessing Approaches of IT Infrastructure Audit]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>35&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/41216/ 41216])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST54195.2021.9772161 10.1109/PICST54195.2021.9772161]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130900011 2-s2.0-85130900011]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9772161 Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>34&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/39482/ 39482])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120713598 2-s2.0-85120713598]</div>
 +
</td>
 +
<td>Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>33&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/39481/ 39481])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120677459 2-s2.0-85120677459]</div>
 +
</td>
 +
<td>On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>32&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/40895/ 40895])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/UkrMiCo52950.2021.9716700 10.1109/UkrMiCo52950.2021.9716700]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126945180 2-s2.0-85126945180]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9716700 Technology of Location Hiding by Spoofing the Mobile Operator IP Address]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>31&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/40894/ 40894])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/UkrMiCo52950.2021.9716665 10.1109/UkrMiCo52950.2021.9716665]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126958490 2-s2.0-85126958490]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9716665 Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>30&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/36995/ 36995])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112360373 2-s2.0-85112360373]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2923/paper27.pdf Analysis of Automatic Speech Recognition Methods]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>29&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/36994/ 36994])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112376265 2-s2.0-85112376265]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2923/paper1.pdf Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>28&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/36975/ 36975])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-030-80472-5_31 10.1007/978-3-030-80472-5_31]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85111924795 2-s2.0-85111924795]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2194-5365 2194-5365]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_31 Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>27&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/36974/ 36974])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-030-80472-5_3 10.1007/978-3-030-80472-5_3]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85111941280 2-s2.0-85111941280]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2194-5365 2194-5365]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_3 Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition]</td>
 +
<td>2021</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>26&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/37097/ 37097])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST51311.2020.9468084 10.1109/PICST51311.2020.9468084]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114396341 2-s2.0-85114396341]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9468084 Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>25&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/37096/ 37096])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST51311.2020.9467886 10.1109/PICST51311.2020.9467886]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114397136 2-s2.0-85114397136]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9467886 Last Mile Technique for Wireless Delivery System using an Accelerating Lens]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>24&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/33888/ 33888])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.3390/electronics9122092 10.3390/electronics9122092]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097402923 2-s2.0-85097402923] (Q2)</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000602048000001 WOS:000602048000001] (Q2)</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2079-9292 2079-9292]</div>
 +
</td>
 +
<td>[https://www.mdpi.com/2079-9292/9/12/2092 Wireless Sensors for Brain Activity — A Survey]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>23&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/34017/ 34017])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/ukrmw49653.2020.9252755 10.1109/ukrmw49653.2020.9252755]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097710865 2-s2.0-85097710865]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9252755 Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>22&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/33908/ 33908])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096935822 2-s2.0-85096935822]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800001 WOS:000651092800001]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2746/paper1.pdf Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>21&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31886/ 31886])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096946608 2-s2.0-85096946608]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800003 WOS:000651092800003]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2746/paper3.pdf Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>20&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31886/ 31886])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.5281/zenodo.3994103 10.5281/zenodo.3994103]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85091320429 2-s2.0-85091320429]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2654/paper12.pdf Implementation of Social Engineering Attack at Institution of Higher Education]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>19&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31678/ 31678])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-030-55506-1_59 10.1007/978-3-030-55506-1_59]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85089721650 2-s2.0-85089721650]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007%2F978-3-030-55506-1_59 Experimental Evaluation of Phishing Attack on High School Students]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>18&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31677/ 31677])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-030-55506-1_47 10.1007/978-3-030-55506-1_47]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85089719737 2-s2.0-85089719737]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007%2F978-3-030-55506-1_47 Metaphone Phonetic Algorithm for Ukrainian Last Names, Medicinal Names, and Toponyms]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>17&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31628/ 31628])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.5281/zenodo.3895814 10.5281/zenodo.3895814]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088881294 2-s2.0-85088881294]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800005 WOS:000664104800005]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2631/paper5.pdf Techniques Comparison for Natural Language Processing]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>16&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31627/ 31627])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.5281/zenodo.3929541 10.5281/zenodo.3929541]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088879005 2-s2.0-85088879005]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800003 WOS:000664104800003]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2631/paper3.pdf Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>15&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31575/ 31575])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-030-43070-2_29 10.1007/978-3-030-43070-2_29]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85087214225 2-s2.0-85087214225]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007%2F978-3-030-43070-2_29 Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>14&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31517/ 31517])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/TCSET49122.2020.235492 10.1109/TCSET49122.2020.235492]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086312920 2-s2.0-85086312920]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000113 WOS:000578041000113]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9088628/ Bandwidth Research of Wireless IoT Switches]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>13&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31518/ 31518])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/TCSET49122.2020.235583 10.1109/TCSET49122.2020.235583]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086313460 2-s2.0-85086313460]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000204 WOS:000578041000204]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9088514/ Sustainability Research of the Secure Wireless Communication System with Channel Reservation]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>12&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31519/ 31519])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST47496.2019.9061376 10.1109/PICST47496.2019.9061376]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85083654177 2-s2.0-85083654177]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9061376/ Analysis of Implementation Results of the Distributed Access Control System]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>11&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/31520/ 31520])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/PICST47496.2019.9061551 10.1109/PICST47496.2019.9061551]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85083675874 2-s2.0-85083675874]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/9061551/ Investigation of Availability of Wireless Access Points based on Embedded Systems]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>10&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/27219/ 27219])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1007/978-3-030-16621-2_57 10.1007/978-3-030-16621-2_57]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85064552966 2-s2.0-85064552966]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007%2F978-3-030-16621-2_57 Implementation of Active Learning in the Master’s Program on Cybersecurity]</td>
 +
<td>2020</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>9&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/29410/ 29410])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.15587/1729-4061.2019.181943 10.15587/1729-4061.2019.181943]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85075389262 2-s2.0-85075389262] (Q2)</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1729-4061 1729-4061]</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1729-3774 1729-3774]</div>
 +
</td>
 +
<td>[http://journals.uran.ua/eejet/article/view/181943 Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>8&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/27984/ 27984])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.28925/2663-4023.2019.4.90103 10.28925/2663-4023.2019.4.90103]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85072951424 2-s2.0-85072951424]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000565635700002 WOS:000565635700002] (Q4)</div>
 +
<div>pISSN:&nbsp;[https://portal.issn.org/resource/ISSN/0302-9743 0302-9743]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1611-3349 1611-3349]</div>
 +
</td>
 +
<td>[https://link.springer.com/chapter/10.1007%2F978-3-030-30859-9_2 Investigation of the IoT Device Lifetime with Secure Data Transmission]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>7&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/26822/ 26822])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/infocommst.2018.8632151 10.1109/INFOCOMMST.2018.8632151]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85062891053 2-s2.0-85062891053]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000458659100109 WOS:000458659100109]</div>
 +
</td>
 +
<td>[https://ieeexplore.ieee.org/document/8632151/ Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>6&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/27704/ 27704])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.2139/ssrn.3455453 10.2139/ssrn.3455453]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068084320 2-s2.0-85068084320]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100021 WOS:000664097100021]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1556-5068 1556-5068]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2386/paper21.pdf Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>5&nbsp;([http://elibrary.kubg.edu.ua/id/eprint/27702/ 27702])</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.5281/zenodo.3256219 10.5281/zenodo.3256219]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068053861 2-s2.0-85068053861]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100017 WOS:000664097100017]</div>
 +
<div>eISSN:&nbsp;[https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div>
 +
</td>
 +
<td>[http://ceur-ws.org/Vol-2386/paper17.pdf Security Rating Metrics for Distributed Wireless Systems]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td style="white-space: nowrap;">
 +
<div>4</div>
 +
</td>
 +
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/infocommst.2017.8246463 10.1109/INFOCOMMST.2017.8246463]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85046096370 2-s2.0-85046096370]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000426514100127 WOS:000426514100127]</div>
 +
</td>
 +
<td>[http://ieeexplore.ieee.org/document/8246463/ Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network]</td>
 
<td>2017</td>
 
<td>2017</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
    <td>
+
<td style="white-space: nowrap;">
DOI:&nbsp;[https://doi.org/10.1109/ICATT.2017.7972671 10.1109/ICATT.2017.7972671]<br />
+
<div>3</div>
EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85027453269 2-s2.0-85027453269]<br />
+
</td>
ISI:&nbsp;[http://apps.webofknowledge.com/InboundService.do?product=WOS&action=retrieve&mode=FullRecord&UT=000426507800086 000426507800086]<br />
+
<td style="white-space: nowrap;">
INSPEC:&nbsp;17014667<br />
+
<div>DOI:&nbsp;[https://doi.org/10.1109/ICATT.2017.7972671 10.1109/ICATT.2017.7972671]</div>
RSCI:&nbsp;[https://elibrary.ru/item.asp?id=31050590 31050590]<br />
+
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85027453269 2-s2.0-85027453269]</div>
IEEE:&nbsp;[http://ieeexplore.ieee.org/document/7972671/ 7972671]<br />
+
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000426507800086 WOS:000426507800086]</div>
ISBN:&nbsp;[http://www.worldcat.org/isbn/9781538629215 978-1-5386-2921-5]
+
 
</td>
 
</td>
<td>Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane</td>
+
<td>[http://ieeexplore.ieee.org/document/7972671/ Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane]</td>
 
<td>2017</td>
 
<td>2017</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
    <td>
+
<td style="white-space: nowrap;">
DOI:&nbsp;[https://doi.org/10.1109/ICATT.2015.7136852 10.1109/ICATT.2015.7136852]<br />
+
<div>2</div>
EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84939458540 2-s2.0-84939458540]<br />
+
ISI:&nbsp;[http://apps.webofknowledge.com/InboundService.do?product=WOS&action=retrieve&mode=FullRecord&UT=000381609800077 000381609800077]<br />
+
INSPEC:&nbsp;15257661<br />
+
RSCI:&nbsp;[https://elibrary.ru/item.asp?id=27942872 27942872]<br />
+
IEEE:&nbsp;[http://ieeexplore.ieee.org/document/7136852/ 7136852]<br />
+
ISBN:&nbsp;[http://www.worldcat.org/isbn/9781479985579 978-1-4799-8557-9]
+
 
</td>
 
</td>
<td>Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems</td>
+
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/ICATT.2015.7136852 10.1109/ICATT.2015.7136852]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84939458540 2-s2.0-84939458540]</div>
 +
<div>ISI:&nbsp;[https://www.webofscience.com/wos/woscc/full-record/WOS:000381609800077 WOS:000381609800077]</div>
 +
</td>
 +
<td>[http://ieeexplore.ieee.org/document/7136852/ Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems]</td>
 
<td>2015</td>
 
<td>2015</td>
 
</tr>
 
</tr>
 
<tr>
 
<tr>
    <td>
+
<td style="white-space: nowrap;">
DOI:&nbsp;[https://doi.org/10.1109/ICATT.2013.6650715 10.1109/ICATT.2013.6650715]<br />
+
<div>1</div>
EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84898619015 2-s2.0-84898619015]<br />
+
INSPEC:&nbsp;13880356<br />
+
RSCI:&nbsp;[https://elibrary.ru/item.asp?id=27931797 27931797]<br />
+
IEEE:&nbsp;[http://ieeexplore.ieee.org/document/6650715/ 6650715]<br />
+
ISBN:&nbsp;[http://www.worldcat.org/isbn/9781479928972 978-1-4799-2897-2]
+
 
</td>
 
</td>
<td>Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11</td>
+
<td style="white-space: nowrap;">
 +
<div>DOI:&nbsp;[https://doi.org/10.1109/ICATT.2013.6650715 10.1109/ICATT.2013.6650715]</div>
 +
<div>EID:&nbsp;[http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84898619015 2-s2.0-84898619015]</div>
 +
</td>
 +
<td>[http://ieeexplore.ieee.org/document/6650715/ Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11]</td>
 
<td>2013</td>
 
<td>2013</td>
 
</tr>
 
</tr>
 
</table>
 
</table>
 +
 +
==Професійний розвиток==
  
 
<table class="wikitable collapsible">
 
<table class="wikitable collapsible">
    <tr><th colspan="3" style="text-align:left">Статті у виданнях, що входять до наукометричних баз даних (окрім Scopus, WOS)</th></tr>
+
<tr>
    <tr>
+
<th colspan="7" style="text-align:left">Захист кандидатської дисертації</th>
        <th width="1%">ID</th>
+
        <th>Назва</th>
+
        <th>Рік</th>
+
    </tr><tr>
+
    <td>24050</td>
+
<td>[http://elibrary.kubg.edu.ua//24050/ Low-Cost Spectrum Analyzers for Channel Allocation in Wireless Networks 2.4 GHz Range]</td>
+
<td>2018</td>
+
 
</tr>
 
</tr>
    <tr>
+
<tr>
    <td>24138</td>
+
<th>ID</th>
        <td>[http://elibrary.kubg.edu.ua//24138/ Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks]</td>
+
<th>Науковий керівник</th>
<td>2018</td>
+
<th>Тема дисертації</th>
 +
<th>Наукова спеціальність, місце захисту</th>
 +
<th>Наукова спеціальність, місце, форма, роки навчання в аспірантурі</th>
 +
<th>Копія диплому</th>
 +
<th>Рік захисту</th>
 +
</tr>
 +
<tr>
 +
<td>63</td>
 +
<td>Бурячок Володимир Леонідович, д.т.н., професор</td>
 +
<td>Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних</td>
 +
<td>05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ)</td>
 +
<td>05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008</td>
 +
<td class="image250">http://rg.kubg.edu.ua/data/dynamicdb/employees_candidate_committee/63/1612_191224110825_001.jpg</td>
 +
<td>2019</td>
 +
</tr>
 +
</table>
 +
 
 +
==Викладацька діяльність==
 +
 
 +
<table class="wikitable collapsible">
 +
<tr>
 +
<th colspan="3" style="text-align:left">Підручники, навчальні посібники (колективні)</th>
 +
</tr>
 +
<tr>
 +
<th width="1%">ID</th>
 +
<th>Назва</th>
 +
<th>Рік</th>
 +
</tr>
 +
<tr>
 +
<td>27294</td>
 +
<td>[http://elibrary.kubg.edu.ua/id/eprint/27294 Безпека безпровідних і мобільних мереж]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td>27191</td>
 +
<td>[http://elibrary.kubg.edu.ua/id/eprint/27191 Технології забезпечення безпеки мережевої інфраструктури]</td>
 +
<td>2019</td>
 +
</tr>
 +
</table>
 +
 
 +
<table class="wikitable collapsible">
 +
<tr>
 +
<th colspan="3" style="text-align:left">Навчальні та методичні матеріали</th>
 +
</tr>
 +
<tr>
 +
<th width="1%">ID</th>
 +
<th>Назва</th>
 +
<th>Рік</th>
 +
</tr>
 +
<tr>
 +
<td>27053</td>
 +
<td>[http://elibrary.kubg.edu.ua/id/eprint/27053 Ініціатива CDIO]</td>
 +
<td>2019</td>
 +
</tr>
 +
<tr>
 +
<td>29432</td>
 +
<td>[http://elibrary.kubg.edu.ua/id/eprint/29432 Керівництво по eduScrum. Правила гри]</td>
 +
<td>2019</td>
 +
</tr>
 +
</table>
 +
 
 +
<table class="wikitable collapsible">
 +
<tr>
 +
<th colspan="4" style="text-align:left">Рейтинг викладачів серед студентів</th>
 +
</tr>
 +
<tr>
 +
<th>ID</th>
 +
<th>Підрозділ</th>
 +
<th>Оцінка студентів</th>
 +
<th>Дата</th>
 +
</tr>
 +
<tr>
 +
<td>6339</td>
 +
<td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td>
 +
<td style="text-align:center;">4,76</td>
 +
<td>30.12.2023</td>
 +
</tr>
 +
<tr>
 +
<td>5455</td>
 +
<td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td>
 +
<td style="text-align:center;">4,92</td>
 +
<td>30.12.2022</td>
 +
</tr>
 +
<tr>
 +
<td>4759</td>
 +
<td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td>
 +
<td style="text-align:center;">4,96</td>
 +
<td>28.12.2021</td>
 +
</tr>
 +
<tr>
 +
<td>4053</td>
 +
<td>Кафедра інформаційної та кібернетичної безпеки</td>
 +
<td style="text-align:center;">4,82</td>
 +
<td>28.12.2020</td>
 +
</tr>
 +
<tr>
 +
<td>2982</td>
 +
<td>Кафедра інформаційної та кібернетичної безпеки</td>
 +
<td style="text-align:center;">4,74</td>
 +
<td>28.12.2019</td>
 +
</tr>
 +
<tr>
 +
<td>2290</td>
 +
<td>Кафедра інформаційної та кібернетичної безпеки</td>
 +
<td style="text-align:center;">4,88</td>
 +
<td>27.12.2018</td>
 
</tr>
 
</tr>
 
</table>
 
</table>

Версія за 22:38, 13 червня 2024

2347 балів (1-е місце) за 2023
1933 бали (2-е місце) за 2022
982 бали (9-е місце) за 2021
1351 бал (3-е місце) за 2020
814 балів (4-е місце) за 2019
103 бали (172-е місце) за 2018
Orcid.png orcID Email s.png Пошта

Науково-дослідницька діяльність

Індекси цитування
Джерело Бібліографічні посилання h-індекс Дата
Scopus 73 18 04.05.2024
WoS 16 4 13.06.2024
Research Gate 103 12 06.04.2024
Google Scholar 146 20 06.04.2024
Публікації у виданнях, що входять до наукометричних баз даних Scopus і WoS
ID Indices Назва Рік
72 (48727)
eISSN: 1613-0073
Methodology for Choosing a Consensus Algorithm for Blockchain Technology 2024
71 (48729)
eISSN: 1613-0073
Tokenomics and Perspectives of Proof of Stake 2024
70 (48576)
eISSN: 1613-0073
Person-of-Interest Detection on Mobile Forensics Data—AI-Driven Roadmap 2024
69 (48575)
eISSN: 1613-0073
Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel 2024
68 (48628)
Wi-Fi Repeater Influence on Wireless Access 2023
67 (48627)
Wi-Fi Interference Resistance to Jamming Attack 2023
66 (48321)
ZigBee Network Resistance to Jamming Attacks 2023
65 (47365)
eISSN: 1613-0073
Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentral-izing the Telecommunications Network 2023
64 (47363)
eISSN: 1613-0073
Properties of Isogeny Graph of Non-Cyclic Edwards Curves 2023
63 (47512)
Jump-Stay Jamming Attack on Wi-Fi Systems 2023
62 (46982)
Bluetooth Low-Energy Beacon Resistance to Jamming Attack 2023
61 (46792)
eISSN: 1613-0073
Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System 2023
60 (46394)
eISSN: 1613-0073
Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves 2023
59 (46307)
Method for Increasing the Various Sources Data Consistency for IoT Sensors 2023
58 (45924)
pISSN: 2367-4512
eISSN: 2367-4520
Social Engineering Penetration Testing in Higher Education Institutions 2023
57 (44602)
pISSN: 0167-4048
eISSN: 1872-6208
Brainwave-based Authentication using Features Fusion 2023
56 (45692)
eISSN: 1613-0073
Smart Home Subsystem for Calculating the Quality of Public Utilities 2023
55 (45691)
eISSN: 1613-0073
CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution 2023
54 (45656)
pISSN: 2367-4512
eISSN: 2367-4520
Implementation of Active Cybersecurity Education in Ukrainian Higher School 2023
53 (43770)
Problematic Issues of the Accelerating Lens Deployment 2023
52 (43769)
pISSN: 1992-8645
eISSN: 1817-3195
Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models 2022
51 (43768)
pISSN: 1992-8645
eISSN: 1817-3195
Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency 2022
50 (43756)
eISSN: 1613-0073
Prototyping Methodology of End-to-End Speech Analytics Software 2022
49 (43156)
pISSN: 1992-8645
eISSN: 1817-3195
Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network 2022
48 (43202)
eISSN: 1613-0073
Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network 2022
47 (43188)
eISSN: 1613-0073
Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves 2022
46 (43154)
pISSN: 2377-6935
eISSN: 2693-3535
Video Channel Suppression Method of Unmanned Aerial Vehicles 2022
45 (41953)
eISSN: 1613-0073
Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity 2022
44 (41951)
eISSN: 1613-0073
Decentralized Access Demarcation System Construction in Situational Center Network 2022
43 (41867)
eISSN: 1613-0073
Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves 2022
42 (41803)
eISSN: 1613-0073
Natural Language Technology to Ensure the Safety of Speech Information 2022
41 (41337)
eISSN: 1613-0073
Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir 2022
40 (41336)
eISSN: 1613-0073
Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center 2022
39 (41190)
eISSN: 1613-0073
Stability Verification of Self-Organized Wireless Networks with Block Encryption 2022
38 (41098)
pISSN: 2367-4512
eISSN: 2367-4520
Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation 2022
37 (41097)
pISSN: 2367-4512
eISSN: 2367-4520
Transferability Evaluation of Speech Emotion Recognition Between Different Languages 2022
36 (41217)
Assessing Approaches of IT Infrastructure Audit 2021
35 (41216)
Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems 2021
34 (39482)
Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry 2021
33 (39481)
On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems 2021
32 (40895)
Technology of Location Hiding by Spoofing the Mobile Operator IP Address 2021
31 (40894)
Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio 2021
30 (36995)
eISSN: 1613-0073
Analysis of Automatic Speech Recognition Methods 2021
29 (36994)
eISSN: 1613-0073
Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves 2021
28 (36975)
eISSN: 2194-5365
Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence 2021
27 (36974)
eISSN: 2194-5365
Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition 2021
26 (37097)
Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches 2020
25 (37096)
Last Mile Technique for Wireless Delivery System using an Accelerating Lens 2020
24 (33888)
eISSN: 2079-9292
Wireless Sensors for Brain Activity — A Survey 2020
23 (34017)
Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum 2020
22 (33908)
eISSN: 1613-0073
Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves 2020
21 (31886)
eISSN: 1613-0073
Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies 2020
20 (31886)
eISSN: 1613-0073
Implementation of Social Engineering Attack at Institution of Higher Education 2020
19 (31678)
pISSN: 2194-5357
Experimental Evaluation of Phishing Attack on High School Students 2020
18 (31677)
pISSN: 2194-5357
Metaphone Phonetic Algorithm for Ukrainian Last Names, Medicinal Names, and Toponyms 2020
17 (31628)
eISSN: 1613-0073
Techniques Comparison for Natural Language Processing 2020
16 (31627)
eISSN: 1613-0073
Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves 2020
15 (31575)
pISSN: 2367-4512
eISSN: 2367-4520
Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range 2020
14 (31517)
Bandwidth Research of Wireless IoT Switches 2020
13 (31518)
Sustainability Research of the Secure Wireless Communication System with Channel Reservation 2020
12 (31519)
Analysis of Implementation Results of the Distributed Access Control System 2020
11 (31520)
Investigation of Availability of Wireless Access Points based on Embedded Systems 2020
10 (27219)
pISSN: 2194-5357
Implementation of Active Learning in the Master’s Program on Cybersecurity 2020
9 (29410)
eISSN: 1729-4061
pISSN: 1729-3774
Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm 2019
8 (27984)
pISSN: 0302-9743
eISSN: 1611-3349
Investigation of the IoT Device Lifetime with Secure Data Transmission 2019
7 (26822)
Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers 2019
6 (27704)
eISSN: 1613-0073
eISSN: 1556-5068
Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio 2019
5 (27702)
eISSN: 1613-0073
Security Rating Metrics for Distributed Wireless Systems 2019
4
Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network 2017
3
Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane 2017
2
Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems 2015
1
Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11 2013

Професійний розвиток

Захист кандидатської дисертації
ID Науковий керівник Тема дисертації Наукова спеціальність, місце захисту Наукова спеціальність, місце, форма, роки навчання в аспірантурі Копія диплому Рік захисту
63 Бурячок Володимир Леонідович, д.т.н., професор Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних 05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ) 05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008 1612_191224110825_001.jpg 2019

Викладацька діяльність

Підручники, навчальні посібники (колективні)
ID Назва Рік
27294 Безпека безпровідних і мобільних мереж 2019
27191 Технології забезпечення безпеки мережевої інфраструктури 2019
Навчальні та методичні матеріали
ID Назва Рік
27053 Ініціатива CDIO 2019
29432 Керівництво по eduScrum. Правила гри 2019
Рейтинг викладачів серед студентів
ID Підрозділ Оцінка студентів Дата
6339 Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка 4,76 30.12.2023
5455 Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка 4,92 30.12.2022
4759 Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка 4,96 28.12.2021
4053 Кафедра інформаційної та кібернетичної безпеки 4,82 28.12.2020
2982 Кафедра інформаційної та кібернетичної безпеки 4,74 28.12.2019
2290 Кафедра інформаційної та кібернетичної безпеки 4,88 27.12.2018