Відмінності між версіями «Соколов Володимир Юрійович»
Матеріал з Київський столичний університет імені Бориса Грінченки
(не показано 97 проміжних версій цього учасника) | |||
Рядок 1: | Рядок 1: | ||
− | <div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px; | + | <div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px;"> |
− | <div style="text-align:center; | + | <div style="text-align:center;"><strong>2347</strong> балів (1-е місце) за 2023</div> |
− | <div style=" | + | <div style="text-align:center;"><strong>1933</strong> бали (2-е місце) за 2022</div> |
− | [[File:orcid.png|24px]] [http://orcid.org/0000-0002-9349-7946 orcID] | + | <div style="text-align:center;"><strong>982</strong> бали (9-е місце) за 2021</div> |
− | + | <div style="text-align:center;"><strong>1351</strong> бал (3-е місце) за 2020</div> | |
− | + | <div style="text-align:center;"><strong>814</strong> балів (4-е місце) за 2019</div> | |
− | + | <div style="text-align:center;"><strong>103</strong> бали (172-е місце) за 2018</div> | |
− | + | <div style="text-align:center; padding-top: 10px;">[[File:orcid.png|24px]] [http://orcid.org/0000-0002-9349-7946 orcID] [[File:email_s.png|24px]] [mailto:v.sokolov@kubg.edu.ua Пошта]</div> | |
− | + | ||
− | + | ||
− | + | ||
− | [[File:email_s.png|24px]] [mailto:v.sokolov@ | + | |
− | + | ||
</div> | </div> | ||
Рядок 18: | Рядок 13: | ||
<table class="wikitable collapsible"> | <table class="wikitable collapsible"> | ||
<tr> | <tr> | ||
− | <th colspan=" | + | <th colspan="4" style="text-align:left">Індекси цитування</th> |
</tr> | </tr> | ||
<tr> | <tr> | ||
+ | <th>Джерело</th> | ||
<th>Бібліографічні посилання</th> | <th>Бібліографічні посилання</th> | ||
<th>h-індекс</th> | <th>h-індекс</th> | ||
− | <th>Дата | + | <th>Дата</th> |
+ | </tr> | ||
+ | <tr style="background:white;"> | ||
+ | <td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td> | ||
+ | <td style="text-align:center;">73</td> | ||
+ | <td style="text-align:center;">18</td> | ||
+ | <td>04.05.2024</td> | ||
+ | </tr> | ||
+ | <tr style="background:white;"> | ||
+ | <td>[https://www.webofscience.com/wos/author/record/400301 WoS]</td> | ||
+ | <td style="text-align:center;">16</td> | ||
+ | <td style="text-align:center;">4</td> | ||
+ | <td>13.06.2024</td> | ||
+ | </tr> | ||
+ | <tr style="background:white;"> | ||
+ | <td>[https://www.researchgate.net/profile/Volodymyr-Sokolov-2 Research Gate]</td> | ||
+ | <td style="text-align:center;">103</td> | ||
+ | <td style="text-align:center;">12</td> | ||
+ | <td>06.04.2024</td> | ||
</tr> | </tr> | ||
<tr style="background:white;"> | <tr style="background:white;"> | ||
− | <td> | + | <td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td> |
− | <td> | + | <td style="text-align:center;">146</td> |
− | <td> | + | <td style="text-align:center;">20</td> |
+ | <td>06.04.2024</td> | ||
</tr> | </tr> | ||
</table> | </table> | ||
Рядок 34: | Рядок 49: | ||
<table class="wikitable collapsible"> | <table class="wikitable collapsible"> | ||
<tr> | <tr> | ||
− | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus | + | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus і WoS</th> |
</tr> | </tr> | ||
<tr> | <tr> | ||
<th width="1%">ID</th> | <th width="1%">ID</th> | ||
− | <th> | + | <th width="1%">Indices</th> |
<th>Назва</th> | <th>Назва</th> | ||
<th>Рік</th> | <th>Рік</th> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>72 ([http://elibrary.kubg.edu.ua/id/eprint/48727/ 48727])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</td> | </td> | ||
− | <td>[ | + | <td style="white-space: nowrap;"> |
− | <td> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85191434425 2-s2.0-85191434425]</div> |
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3665/short6.pdf Methodology for Choosing a Consensus Algorithm for Blockchain Technology]</td> | ||
+ | <td>2024</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>71 ([http://elibrary.kubg.edu.ua/id/eprint/48729/ 48729])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</td> | </td> | ||
− | <td>[ | + | <td style="white-space: nowrap;"> |
− | <td> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85191421388 2-s2.0-85191421388]</div> |
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3665/short1.pdf Tokenomics and Perspectives of Proof of Stake]</td> | ||
+ | <td>2024</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>70 ([http://elibrary.kubg.edu.ua/id/eprint/48576/ 48576])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</td> | </td> | ||
− | <td>[ | + | <td style="white-space: nowrap;"> |
− | <td> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189143222 2-s2.0-85189143222]</div> |
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3654/paper20.pdf Person-of-Interest Detection on Mobile Forensics Data—AI-Driven Roadmap]</td> | ||
+ | <td>2024</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>69 ([http://elibrary.kubg.edu.ua/id/eprint/48575/ 48575])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</td> | </td> | ||
− | <td>[ | + | <td style="white-space: nowrap;"> |
− | <td> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189144731 2-s2.0-85189144731]</div> |
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3654/paper9.pdf Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel]</td> | ||
+ | <td>2024</td> | ||
</tr> | </tr> | ||
− | |||
− | |||
− | |||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
+ | <div>68 ([http://elibrary.kubg.edu.ua/id/eprint/48628/ 48628])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/AICT61584.2023.10452421 10.1109/AICT61584.2023.10452421]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189553415 2-s2.0-85189553415]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10452421 Wi-Fi Repeater Influence on Wireless Access]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
− | < | + | <div>67 ([http://elibrary.kubg.edu.ua/id/eprint/48627/ 48627])</div> |
− | < | + | </td> |
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/AICT61584.2023.10452687 10.1109/AICT61584.2023.10452687]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189527228 2-s2.0-85189527228]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10452687 Wi-Fi Interference Resistance to Jamming Attack ]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
− | <td>[ | + | <div>66 ([http://elibrary.kubg.edu.ua/id/eprint/48321/ 48321])</div> |
− | <td> | + | </td> |
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMiCo61577.2023.10380360 10.1109/UkrMiCo61577.2023.10380360]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85183457098 2-s2.0-85183457098]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10380360 ZigBee Network Resistance to Jamming Attacks]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
− | <td>[http:// | + | <div>65 ([http://elibrary.kubg.edu.ua/id/eprint/47365/ 47365])</div> |
− | <td> | + | </td> |
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178338434 2-s2.0-85178338434]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3550/short7.pdf Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentral-izing the Telecommunications Network]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
− | |||
− | |||
− | |||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
+ | <div>64 ([http://elibrary.kubg.edu.ua/id/eprint/47363/ 47363])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178378792 2-s2.0-85178378792]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3550/short6.pdf Properties of Isogeny Graph of Non-Cyclic Edwards Curves]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
− | < | + | <div>63 ([http://elibrary.kubg.edu.ua/id/eprint/47512/ 47512])</div> |
− | < | + | </td> |
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/CSIT61576.2023.10324031 10.1109/CSIT61576.2023.10324031]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179844674 2-s2.0-85179844674]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10324031 Jump-Stay Jamming Attack on Wi-Fi Systems]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>62 ([http://elibrary.kubg.edu.ua/id/eprint/46982/ 46982])</div> | |
− | <td> | + | </td> |
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ELIT61488.2023.10310815 10.1109/ELIT61488.2023.10310815]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179520418 2-s2.0-85179520418]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10310815 Bluetooth Low-Energy Beacon Resistance to Jamming Attack]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>61 ([http://elibrary.kubg.edu.ua/id/eprint/46792/ 46792])</div> | |
− | <td> | + | </td> |
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85176926997 2-s2.0-85176926997]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3530/paper11.pdf Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
− | |||
− | |||
− | |||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
+ | <div>60 ([http://elibrary.kubg.edu.ua/id/eprint/46394/ 46394])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85175724530 2-s2.0-85175724530]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3504/paper2.pdf Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
− | + | <div>59 ([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])</div> | |
− | < | + | </td> |
− | + | <td style="white-space: nowrap;"> | |
− | < | + | <div>DOI: [https://doi.org/10.1109/PICST57299.2022.10238518 10.1109/PICST57299.2022.10238518]</div> |
− | < | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85172739043 2-s2.0-85172739043]</div> |
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10238518 Method for Increasing the Various Sources Data Consistency for IoT Sensors]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>58 ([http://elibrary.kubg.edu.ua/id/eprint/45924/ 45924])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | <div> | + | |
− | + | ||
− | + | ||
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-36118-0_96 10.1007/978-3-031-36118-0_96]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85169039263 2-s2.0-85169039263]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-36118-0_96 Social Engineering Penetration Testing in Higher Education Institutions]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>57 ([http://elibrary.kubg.edu.ua/id/eprint/44602/ 44602])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1016/j.cose.2023.103198 10.1016/j.cose.2023.103198]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85150928741 2-s2.0-85150928741] (Q1)</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:001053816800001 WOS:001053816800001] (Q1)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/0167-4048 0167-4048]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1872-6208 1872-6208]</div> | ||
+ | </td> | ||
+ | <td>[https://www.sciencedirect.com/science/article/pii/S0167404823001086 Brainwave-based Authentication using Features Fusion]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>56 ([http://elibrary.kubg.edu.ua/id/eprint/45692/ 45692])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163896091 2-s2.0-85163896091]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3421/short1.pdf Smart Home Subsystem for Calculating the Quality of Public Utilities]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>55 ([http://elibrary.kubg.edu.ua/id/eprint/45691/ 45691])</div> | |
− | + | </td> | |
− | <td> | + | <td style="white-space: nowrap;"> |
− | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163882231 2-s2.0-85163882231]</div> | |
− | <div | + | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> |
</td> | </td> | ||
− | <td> | + | <td>[https://ceur-ws.org/Vol-3421/paper4.pdf CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution]</td> |
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>54 ([http://elibrary.kubg.edu.ua/id/eprint/45656/ 45656])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-35467-0_32 10.1007/978-3-031-35467-0_32]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85162953358 2-s2.0-85162953358]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-35467-0_32 Implementation of Active Cybersecurity Education in Ukrainian Higher School]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>53 ([http://elibrary.kubg.edu.ua/id/eprint/43770/ 43770])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMW58013.2022.10037124 10.1109/UkrMW58013.2022.10037124]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85149175780 2-s2.0-85149175780]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:001058645700077 WOS:001058645700077]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/abstract/document/10037124 Problematic Issues of the Accelerating Lens Deployment]</td> | ||
+ | <td>2023</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>52 ([http://elibrary.kubg.edu.ua/id/eprint/43769/ 43769])</div> | |
− | + | ||
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145368917 2-s2.0-85145368917] (Q4)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div> | ||
+ | </td> | ||
+ | <td>[http://www.jatit.org/volumes/Vol100No24/18Vol100No24.pdf Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
− | |||
− | |||
− | |||
− | |||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
+ | <div>51 ([http://elibrary.kubg.edu.ua/id/eprint/43768/ 43768])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145479763 2-s2.0-85145479763] (Q4)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div> | ||
+ | </td> | ||
+ | <td>[http://www.jatit.org/volumes/Vol100No24/15Vol100No24.pdf Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | < | + | <td style="white-space: nowrap;"> |
− | < | + | <div>50 ([http://elibrary.kubg.edu.ua/id/eprint/43756/ 43756])</div> |
− | + | </td> | |
− | < | + | <td style="white-space: nowrap;"> |
− | < | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85146116195 2-s2.0-85146116195]</div> |
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3312/paper6.pdf Prototyping Methodology of End-to-End Speech Analytics Software]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>49 ([http://elibrary.kubg.edu.ua/id/eprint/43156/ 43156])</div> | |
− | + | </td> | |
− | <td> | + | <td style="white-space: nowrap;"> |
− | <div | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143412570 2-s2.0-85143412570] (Q4)</div> |
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div> | ||
</td> | </td> | ||
− | <td> | + | <td>[http://www.jatit.org/volumes/Vol100No22/18Vol100No22.pdf Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network]</td> |
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>48 ([http://elibrary.kubg.edu.ua/id/eprint/43202/ 43202])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143791399 2-s2.0-85143791399]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3288/short13.pdf Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>47 ([http://elibrary.kubg.edu.ua/id/eprint/43188/ 43188])</div> | |
− | + | ||
− | + | ||
− | <div> | + | |
− | + | ||
− | + | ||
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143809498 2-s2.0-85143809498]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3288/paper1.pdf Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>46 ([http://elibrary.kubg.edu.ua/id/eprint/43154/ 43154])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1109/ELNANO54667.2022.9927105 10.1109/ELNANO54667.2022.9927105]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85142604882 2-s2.0-85142604882]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2377-6935 2377-6935]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2693-3535 2693-3535]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9927105 Video Channel Suppression Method of Unmanned Aerial Vehicles]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>45 ([http://elibrary.kubg.edu.ua/id/eprint/41953/ 41953])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137151000 2-s2.0-85137151000]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3188/short10.pdf Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>44 ([http://elibrary.kubg.edu.ua/id/eprint/41951/ 41951])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139416 2-s2.0-85137139416]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3188/paper18.pdf Decentralized Access Demarcation System Construction in Situational Center Network]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>43 ([http://elibrary.kubg.edu.ua/id/eprint/41867/ 41867])</div> | |
− | + | </td> | |
− | <td> | + | <td style="white-space: nowrap;"> |
− | <div | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137145539 2-s2.0-85137145539]</div> |
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
− | <td> | + | <td>[http://ceur-ws.org/Vol-3187/short10.pdf Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves]</td> |
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>42 ([http://elibrary.kubg.edu.ua/id/eprint/41803/ 41803])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139799 2-s2.0-85137139799]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3187/paper20.pdf Natural Language Technology to Ensure the Safety of Speech Information]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>41 ([http://elibrary.kubg.edu.ua/id/eprint/41337/ 41337])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132243825 2-s2.0-85132243825]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3149/short11.pdf Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>40 ([http://elibrary.kubg.edu.ua/id/eprint/41336/ 41336])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132269263 2-s2.0-85132269263]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3149/short8.pdf Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>39 ([http://elibrary.kubg.edu.ua/id/eprint/41190/ 41190])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.32782/cmis/3137-19 10.32782/cmis/3137-19]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130712118 2-s2.0-85130712118]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3137/paper19.pdf Stability Verification of Self-Organized Wireless Networks with Block Encryption]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>38 ([http://elibrary.kubg.edu.ua/id/eprint/41098/ 41098])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-04809-8_53 10.1007/978-3-031-04809-8_53]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129657396 2-s2.0-85129657396]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-04809-8_53 Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>37 ([http://elibrary.kubg.edu.ua/id/eprint/41097/ 41097])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td> | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-04812-8_35 10.1007/978-3-031-04812-8_35]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129602152 2-s2.0-85129602152]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-04812-8_35 Transferability Evaluation of Speech Emotion Recognition Between Different Languages]</td> | ||
+ | <td>2022</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
− | <td | + | <td style="white-space: nowrap;"> |
− | + | <div>36 ([http://elibrary.kubg.edu.ua/id/eprint/41217/ 41217])</div> | |
− | + | ||
− | + | ||
− | <div | + | |
</td> | </td> | ||
− | <td>26.12. | + | <td style="white-space: nowrap;"> |
+ | <div>DOI: [https://doi.org/10.1109/PICST54195.2021.9772181 10.1109/PICST54195.2021.9772181]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130949573 2-s2.0-85130949573]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9772181 Assessing Approaches of IT Infrastructure Audit]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>35 ([http://elibrary.kubg.edu.ua/id/eprint/41216/ 41216])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST54195.2021.9772161 10.1109/PICST54195.2021.9772161]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130900011 2-s2.0-85130900011]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9772161 Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>34 ([http://elibrary.kubg.edu.ua/id/eprint/39482/ 39482])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120713598 2-s2.0-85120713598]</div> | ||
+ | </td> | ||
+ | <td>Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>33 ([http://elibrary.kubg.edu.ua/id/eprint/39481/ 39481])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120677459 2-s2.0-85120677459]</div> | ||
+ | </td> | ||
+ | <td>On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>32 ([http://elibrary.kubg.edu.ua/id/eprint/40895/ 40895])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMiCo52950.2021.9716700 10.1109/UkrMiCo52950.2021.9716700]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126945180 2-s2.0-85126945180]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9716700 Technology of Location Hiding by Spoofing the Mobile Operator IP Address]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>31 ([http://elibrary.kubg.edu.ua/id/eprint/40894/ 40894])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMiCo52950.2021.9716665 10.1109/UkrMiCo52950.2021.9716665]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126958490 2-s2.0-85126958490]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9716665 Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>30 ([http://elibrary.kubg.edu.ua/id/eprint/36995/ 36995])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112360373 2-s2.0-85112360373]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2923/paper27.pdf Analysis of Automatic Speech Recognition Methods]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>29 ([http://elibrary.kubg.edu.ua/id/eprint/36994/ 36994])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112376265 2-s2.0-85112376265]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2923/paper1.pdf Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>28 ([http://elibrary.kubg.edu.ua/id/eprint/36975/ 36975])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-030-80472-5_31 10.1007/978-3-030-80472-5_31]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85111924795 2-s2.0-85111924795]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2194-5365 2194-5365]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_31 Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>27 ([http://elibrary.kubg.edu.ua/id/eprint/36974/ 36974])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-030-80472-5_3 10.1007/978-3-030-80472-5_3]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85111941280 2-s2.0-85111941280]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2194-5365 2194-5365]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_3 Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>26 ([http://elibrary.kubg.edu.ua/id/eprint/37097/ 37097])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST51311.2020.9468084 10.1109/PICST51311.2020.9468084]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114396341 2-s2.0-85114396341]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9468084 Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>25 ([http://elibrary.kubg.edu.ua/id/eprint/37096/ 37096])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST51311.2020.9467886 10.1109/PICST51311.2020.9467886]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114397136 2-s2.0-85114397136]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9467886 Last Mile Technique for Wireless Delivery System using an Accelerating Lens]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>24 ([http://elibrary.kubg.edu.ua/id/eprint/33888/ 33888])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.3390/electronics9122092 10.3390/electronics9122092]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097402923 2-s2.0-85097402923] (Q2)</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000602048000001 WOS:000602048000001] (Q2)</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2079-9292 2079-9292]</div> | ||
+ | </td> | ||
+ | <td>[https://www.mdpi.com/2079-9292/9/12/2092 Wireless Sensors for Brain Activity — A Survey]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>23 ([http://elibrary.kubg.edu.ua/id/eprint/34017/ 34017])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ukrmw49653.2020.9252755 10.1109/ukrmw49653.2020.9252755]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097710865 2-s2.0-85097710865]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9252755 Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>22 ([http://elibrary.kubg.edu.ua/id/eprint/33908/ 33908])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096935822 2-s2.0-85096935822]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800001 WOS:000651092800001]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2746/paper1.pdf Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>21 ([http://elibrary.kubg.edu.ua/id/eprint/31886/ 31886])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096946608 2-s2.0-85096946608]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800003 WOS:000651092800003]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2746/paper3.pdf Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>20 ([http://elibrary.kubg.edu.ua/id/eprint/31886/ 31886])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.5281/zenodo.3994103 10.5281/zenodo.3994103]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85091320429 2-s2.0-85091320429]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2654/paper12.pdf Implementation of Social Engineering Attack at Institution of Higher Education]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>19 ([http://elibrary.kubg.edu.ua/id/eprint/31678/ 31678])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-030-55506-1_59 10.1007/978-3-030-55506-1_59]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85089721650 2-s2.0-85089721650]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-55506-1_59 Experimental Evaluation of Phishing Attack on High School Students]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>18 ([http://elibrary.kubg.edu.ua/id/eprint/31677/ 31677])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-030-55506-1_47 10.1007/978-3-030-55506-1_47]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85089719737 2-s2.0-85089719737]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-55506-1_47 Metaphone Phonetic Algorithm for Ukrainian Last Names, Medicinal Names, and Toponyms]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>17 ([http://elibrary.kubg.edu.ua/id/eprint/31628/ 31628])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.5281/zenodo.3895814 10.5281/zenodo.3895814]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088881294 2-s2.0-85088881294]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800005 WOS:000664104800005]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2631/paper5.pdf Techniques Comparison for Natural Language Processing]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>16 ([http://elibrary.kubg.edu.ua/id/eprint/31627/ 31627])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.5281/zenodo.3929541 10.5281/zenodo.3929541]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088879005 2-s2.0-85088879005]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800003 WOS:000664104800003]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2631/paper3.pdf Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>15 ([http://elibrary.kubg.edu.ua/id/eprint/31575/ 31575])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-030-43070-2_29 10.1007/978-3-030-43070-2_29]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85087214225 2-s2.0-85087214225]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-43070-2_29 Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>14 ([http://elibrary.kubg.edu.ua/id/eprint/31517/ 31517])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235492 10.1109/TCSET49122.2020.235492]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086312920 2-s2.0-85086312920]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000113 WOS:000578041000113]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9088628/ Bandwidth Research of Wireless IoT Switches]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>13 ([http://elibrary.kubg.edu.ua/id/eprint/31518/ 31518])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235583 10.1109/TCSET49122.2020.235583]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086313460 2-s2.0-85086313460]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000204 WOS:000578041000204]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9088514/ Sustainability Research of the Secure Wireless Communication System with Channel Reservation]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>12 ([http://elibrary.kubg.edu.ua/id/eprint/31519/ 31519])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST47496.2019.9061376 10.1109/PICST47496.2019.9061376]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85083654177 2-s2.0-85083654177]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9061376/ Analysis of Implementation Results of the Distributed Access Control System]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>11 ([http://elibrary.kubg.edu.ua/id/eprint/31520/ 31520])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST47496.2019.9061551 10.1109/PICST47496.2019.9061551]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85083675874 2-s2.0-85083675874]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9061551/ Investigation of Availability of Wireless Access Points based on Embedded Systems]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>10 ([http://elibrary.kubg.edu.ua/id/eprint/27219/ 27219])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-030-16621-2_57 10.1007/978-3-030-16621-2_57]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85064552966 2-s2.0-85064552966]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2194-5357 2194-5357]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-16621-2_57 Implementation of Active Learning in the Master’s Program on Cybersecurity]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>9 ([http://elibrary.kubg.edu.ua/id/eprint/29410/ 29410])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.15587/1729-4061.2019.181943 10.15587/1729-4061.2019.181943]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85075389262 2-s2.0-85075389262] (Q2)</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1729-4061 1729-4061]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1729-3774 1729-3774]</div> | ||
+ | </td> | ||
+ | <td>[http://journals.uran.ua/eejet/article/view/181943 Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>8 ([http://elibrary.kubg.edu.ua/id/eprint/27984/ 27984])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.28925/2663-4023.2019.4.90103 10.28925/2663-4023.2019.4.90103]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85072951424 2-s2.0-85072951424]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000565635700002 WOS:000565635700002] (Q4)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/0302-9743 0302-9743]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1611-3349 1611-3349]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007%2F978-3-030-30859-9_2 Investigation of the IoT Device Lifetime with Secure Data Transmission]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>7 ([http://elibrary.kubg.edu.ua/id/eprint/26822/ 26822])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/infocommst.2018.8632151 10.1109/INFOCOMMST.2018.8632151]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85062891053 2-s2.0-85062891053]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000458659100109 WOS:000458659100109]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/8632151/ Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>6 ([http://elibrary.kubg.edu.ua/id/eprint/27704/ 27704])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.2139/ssrn.3455453 10.2139/ssrn.3455453]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068084320 2-s2.0-85068084320]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100021 WOS:000664097100021]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1556-5068 1556-5068]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2386/paper21.pdf Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>5 ([http://elibrary.kubg.edu.ua/id/eprint/27702/ 27702])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.5281/zenodo.3256219 10.5281/zenodo.3256219]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068053861 2-s2.0-85068053861]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100017 WOS:000664097100017]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-2386/paper17.pdf Security Rating Metrics for Distributed Wireless Systems]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>4</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/infocommst.2017.8246463 10.1109/INFOCOMMST.2017.8246463]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85046096370 2-s2.0-85046096370]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000426514100127 WOS:000426514100127]</div> | ||
+ | </td> | ||
+ | <td>[http://ieeexplore.ieee.org/document/8246463/ Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network]</td> | ||
+ | <td>2017</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>3</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ICATT.2017.7972671 10.1109/ICATT.2017.7972671]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85027453269 2-s2.0-85027453269]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000426507800086 WOS:000426507800086]</div> | ||
+ | </td> | ||
+ | <td>[http://ieeexplore.ieee.org/document/7972671/ Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane]</td> | ||
+ | <td>2017</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>2</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ICATT.2015.7136852 10.1109/ICATT.2015.7136852]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84939458540 2-s2.0-84939458540]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000381609800077 WOS:000381609800077]</div> | ||
+ | </td> | ||
+ | <td>[http://ieeexplore.ieee.org/document/7136852/ Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems]</td> | ||
+ | <td>2015</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>1</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ICATT.2013.6650715 10.1109/ICATT.2013.6650715]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84898619015 2-s2.0-84898619015]</div> | ||
+ | </td> | ||
+ | <td>[http://ieeexplore.ieee.org/document/6650715/ Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11]</td> | ||
+ | <td>2013</td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |||
+ | ==Професійний розвиток== | ||
+ | |||
+ | <table class="wikitable collapsible"> | ||
+ | <tr> | ||
+ | <th colspan="7" style="text-align:left">Захист кандидатської дисертації</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <th>ID</th> | ||
+ | <th>Науковий керівник</th> | ||
+ | <th>Тема дисертації</th> | ||
+ | <th>Наукова спеціальність, місце захисту</th> | ||
+ | <th>Наукова спеціальність, місце, форма, роки навчання в аспірантурі</th> | ||
+ | <th>Копія диплому</th> | ||
+ | <th>Рік захисту</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>63</td> | ||
+ | <td>Бурячок Володимир Леонідович, д.т.н., професор</td> | ||
+ | <td>Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних</td> | ||
+ | <td>05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ)</td> | ||
+ | <td>05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008</td> | ||
+ | <td class="image250">http://rg.kubg.edu.ua/data/dynamicdb/employees_candidate_committee/63/1612_191224110825_001.jpg</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |||
+ | ==Викладацька діяльність== | ||
+ | |||
+ | <table class="wikitable collapsible"> | ||
+ | <tr> | ||
+ | <th colspan="3" style="text-align:left">Підручники, навчальні посібники (колективні)</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <th width="1%">ID</th> | ||
+ | <th>Назва</th> | ||
+ | <th>Рік</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>27294</td> | ||
+ | <td>[http://elibrary.kubg.edu.ua/id/eprint/27294 Безпека безпровідних і мобільних мереж]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>27191</td> | ||
+ | <td>[http://elibrary.kubg.edu.ua/id/eprint/27191 Технології забезпечення безпеки мережевої інфраструктури]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |||
+ | <table class="wikitable collapsible"> | ||
+ | <tr> | ||
+ | <th colspan="3" style="text-align:left">Навчальні та методичні матеріали</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <th width="1%">ID</th> | ||
+ | <th>Назва</th> | ||
+ | <th>Рік</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>27053</td> | ||
+ | <td>[http://elibrary.kubg.edu.ua/id/eprint/27053 Ініціатива CDIO]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>29432</td> | ||
+ | <td>[http://elibrary.kubg.edu.ua/id/eprint/29432 Керівництво по eduScrum. Правила гри]</td> | ||
+ | <td>2019</td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |||
+ | <table class="wikitable collapsible"> | ||
+ | <tr> | ||
+ | <th colspan="4" style="text-align:left">Рейтинг викладачів серед студентів</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <th>ID</th> | ||
+ | <th>Підрозділ</th> | ||
+ | <th>Оцінка студентів</th> | ||
+ | <th>Дата</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>6339</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td> | ||
+ | <td style="text-align:center;">4,76</td> | ||
+ | <td>30.12.2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>5455</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td> | ||
+ | <td style="text-align:center;">4,92</td> | ||
+ | <td>30.12.2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>4759</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td> | ||
+ | <td style="text-align:center;">4,96</td> | ||
+ | <td>28.12.2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>4053</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки</td> | ||
+ | <td style="text-align:center;">4,82</td> | ||
+ | <td>28.12.2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>2982</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки</td> | ||
+ | <td style="text-align:center;">4,74</td> | ||
+ | <td>28.12.2019</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>2290</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки</td> | ||
+ | <td style="text-align:center;">4,88</td> | ||
+ | <td>27.12.2018</td> | ||
</tr> | </tr> | ||
</table> | </table> |
Версія за 22:38, 13 червня 2024
2347 балів (1-е місце) за 2023
1933 бали (2-е місце) за 2022
982 бали (9-е місце) за 2021
1351 бал (3-е місце) за 2020
814 балів (4-е місце) за 2019
103 бали (172-е місце) за 2018
Науково-дослідницька діяльність
Індекси цитування | |||
---|---|---|---|
Джерело | Бібліографічні посилання | h-індекс | Дата |
Scopus | 73 | 18 | 04.05.2024 |
WoS | 16 | 4 | 13.06.2024 |
Research Gate | 103 | 12 | 06.04.2024 |
Google Scholar | 146 | 20 | 06.04.2024 |
Професійний розвиток
Захист кандидатської дисертації | ||||||
---|---|---|---|---|---|---|
ID | Науковий керівник | Тема дисертації | Наукова спеціальність, місце захисту | Наукова спеціальність, місце, форма, роки навчання в аспірантурі | Копія диплому | Рік захисту |
63 | Бурячок Володимир Леонідович, д.т.н., професор | Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних | 05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ) | 05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008 | 2019 |
Викладацька діяльність
Підручники, навчальні посібники (колективні) | ||
---|---|---|
ID | Назва | Рік |
27294 | Безпека безпровідних і мобільних мереж | 2019 |
27191 | Технології забезпечення безпеки мережевої інфраструктури | 2019 |
Навчальні та методичні матеріали | ||
---|---|---|
ID | Назва | Рік |
27053 | Ініціатива CDIO | 2019 |
29432 | Керівництво по eduScrum. Правила гри | 2019 |
Рейтинг викладачів серед студентів | |||
---|---|---|---|
ID | Підрозділ | Оцінка студентів | Дата |
6339 | Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка | 4,76 | 30.12.2023 |
5455 | Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка | 4,92 | 30.12.2022 |
4759 | Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка | 4,96 | 28.12.2021 |
4053 | Кафедра інформаційної та кібернетичної безпеки | 4,82 | 28.12.2020 |
2982 | Кафедра інформаційної та кібернетичної безпеки | 4,74 | 28.12.2019 |
2290 | Кафедра інформаційної та кібернетичної безпеки | 4,88 | 27.12.2018 |