Відмінності між версіями «Соколов Володимир Юрійович»
(не показано 34 проміжні версії 2 учасників) | |||
Рядок 1: | Рядок 1: | ||
− | <div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px; | + | ==Е-портфоліо== |
− | <div style="text-align:center; | + | |
+ | {{Е-Портфоліо\Шапка | ||
+ | |Фото= | ||
+ | https://eportfolio.kubg.edu.ua/data/user/2100/photo.jpg | ||
+ | |ПІБ=Соколов Володимир Юрійович | ||
+ | |Рейтинг= | ||
+ | Рейтинг на 2023 рік: <strong>2347</strong><br>(#1 у загальному рейтингу) | ||
+ | |||
+ | |Підрозділ= | ||
+ | Факультет інформаційних технологій та математики, Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка <br><span style="font-size:85%;"></span> | ||
+ | |||
+ | |Посада= | ||
+ | Доцент кафедри | ||
+ | |Звання= | ||
+ | Кандидат технічних наук. Доцент. | ||
+ | |||
+ | |||
+ | |facebook=https://www.researchgate.net/profile/Vladimir_Sokolov8 | ||
+ | |schoolar=https://scholar.google.com/citations?user=_Zicvs8AAAAJ | ||
+ | |email=v.sokolov@kubg.edu.ua }} | ||
+ | <div style="float:right;width:250px;background:#FFF;margin:15px;border: 1px solid #000; padding: 10px;"> | ||
+ | <div style="text-align:center;"><strong>2347</strong> балів (1-е місце) за 2023</div> | ||
+ | <div style="text-align:center;"><strong>1933</strong> бали (2-е місце) за 2022</div> | ||
+ | <div style="text-align:center;"><strong>982</strong> бали (9-е місце) за 2021</div> | ||
<div style="text-align:center;"><strong>1351</strong> бал (3-е місце) за 2020</div> | <div style="text-align:center;"><strong>1351</strong> бал (3-е місце) за 2020</div> | ||
<div style="text-align:center;"><strong>814</strong> балів (4-е місце) за 2019</div> | <div style="text-align:center;"><strong>814</strong> балів (4-е місце) за 2019</div> | ||
<div style="text-align:center;"><strong>103</strong> бали (172-е місце) за 2018</div> | <div style="text-align:center;"><strong>103</strong> бали (172-е місце) за 2018</div> | ||
− | <div style=" | + | <div style="text-align:center; padding-top: 10px;">[[File:orcid.png|24px]] [http://orcid.org/0000-0002-9349-7946 orcID] [[File:email_s.png|24px]] [mailto:v.sokolov@kubg.edu.ua Пошта]</div> |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
</div> | </div> | ||
+ | |||
+ | ===Додаткові відомості=== | ||
+ | ====Освіта==== | ||
+ | <p>2008 | State University of Telecommunications: Kyiv, UA | Department of Information Security | Postgraduate studies</p><p>2005 | Kyiv Polytechnic Institute: Kyiv, UA | Faculty of Electronics | Master of Electronic Engineering</p> | ||
+ | ====Перелік місць роботи==== | ||
+ | <p>2018 to present | Borys Grinchenko Kyiv University: Kyiv, UA | Department of Information and Cyber Security | Senior lecturer</p><p>2005 to 2018 | State University of Telecommunications: Kyiv, UA | Department of Information Security | Senior lecturer</p> | ||
+ | ====Теми дисертацій (захищених)==== | ||
+ | <p>10/29/2019 | Methods and Means of Enhancing Information and Functional Security of Wireless Data | ||
+ | Networks | Institute of Telecommunications and Global Information Space: Kyiv, UA | PhD in IT</p> | ||
+ | ====Громадська активність==== | ||
+ | European Microwave Association (EuMA): Louvain-la-Neuve, BE | ||
+ | Center for Internet Security (CIS): East Greenbush, NY, US | ||
+ | Malware Information Sharing Platform (MISP): Bethesda, MD, US | ||
+ | International Telecommunication Union (ITU): Geneva, CH | ||
+ | Internet Society (IS): Reston, VA, US | ||
==Науково-дослідницька діяльність== | ==Науково-дослідницька діяльність== | ||
Рядок 15: | Рядок 49: | ||
<table class="wikitable collapsible"> | <table class="wikitable collapsible"> | ||
<tr> | <tr> | ||
− | <th colspan=" | + | <th colspan="4" style="text-align:left">Індекси цитування</th> |
</tr> | </tr> | ||
<tr> | <tr> | ||
Рядок 25: | Рядок 59: | ||
<tr style="background:white;"> | <tr style="background:white;"> | ||
<td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td> | <td>[https://www.scopus.com/authid/detail.uri?authorId=56114799500 Scopus]</td> | ||
− | <td style="text-align:center;"> | + | <td style="text-align:center;">73</td> |
− | <td style="text-align:center;"> | + | <td style="text-align:center;">18</td> |
− | <td> | + | <td>04.05.2024</td> |
</tr> | </tr> | ||
<tr style="background:white;"> | <tr style="background:white;"> | ||
− | <td>[https:// | + | <td>[https://www.webofscience.com/wos/author/record/400301 WoS]</td> |
− | <td style="text-align:center;"> | + | <td style="text-align:center;">16</td> |
− | <td style="text-align:center;"> | + | <td style="text-align:center;">4</td> |
− | <td> | + | <td>13.06.2024</td> |
</tr> | </tr> | ||
<tr style="background:white;"> | <tr style="background:white;"> | ||
− | <td>[https://www.researchgate.net/profile/ | + | <td>[https://www.researchgate.net/profile/Volodymyr-Sokolov-2 Research Gate]</td> |
− | <td style="text-align:center;"> | + | <td style="text-align:center;">103</td> |
− | <td style="text-align:center;"> | + | <td style="text-align:center;">12</td> |
− | <td> | + | <td>06.04.2024</td> |
</tr> | </tr> | ||
<tr style="background:white;"> | <tr style="background:white;"> | ||
<td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td> | <td>[https://scholar.google.com/citations?user=_Zicvs8AAAAJ Google Scholar]</td> | ||
− | <td style="text-align:center;"> | + | <td style="text-align:center;">146</td> |
− | <td style="text-align:center;"> | + | <td style="text-align:center;">20</td> |
− | <td> | + | <td>06.04.2024</td> |
</tr> | </tr> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
</table> | </table> | ||
<table class="wikitable collapsible"> | <table class="wikitable collapsible"> | ||
<tr> | <tr> | ||
− | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus | + | <th colspan="4" style="text-align:left">Публікації у виданнях, що входять до наукометричних баз даних Scopus і WoS</th> |
</tr> | </tr> | ||
<tr> | <tr> | ||
Рядок 73: | Рядок 95: | ||
<tr> | <tr> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
− | <div> | + | <div>72 ([http://elibrary.kubg.edu.ua/id/eprint/48727/ 48727])</div> |
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85191434425 2-s2.0-85191434425]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3665/short6.pdf Methodology for Choosing a Consensus Algorithm for Blockchain Technology]</td> | ||
+ | <td>2024</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>71 ([http://elibrary.kubg.edu.ua/id/eprint/48729/ 48729])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85191421388 2-s2.0-85191421388]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3665/short1.pdf Tokenomics and Perspectives of Proof of Stake]</td> | ||
+ | <td>2024</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>70 ([http://elibrary.kubg.edu.ua/id/eprint/48576/ 48576])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189143222 2-s2.0-85189143222]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3654/paper20.pdf Person-of-Interest Detection on Mobile Forensics Data—AI-Driven Roadmap]</td> | ||
+ | <td>2024</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>69 ([http://elibrary.kubg.edu.ua/id/eprint/48575/ 48575])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189144731 2-s2.0-85189144731]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3654/paper9.pdf Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel]</td> | ||
+ | <td>2024</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>68 ([http://elibrary.kubg.edu.ua/id/eprint/48628/ 48628])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/AICT61584.2023.10452421 10.1109/AICT61584.2023.10452421]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189553415 2-s2.0-85189553415]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10452421 Wi-Fi Repeater Influence on Wireless Access]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>67 ([http://elibrary.kubg.edu.ua/id/eprint/48627/ 48627])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/AICT61584.2023.10452687 10.1109/AICT61584.2023.10452687]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85189527228 2-s2.0-85189527228]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10452687 Wi-Fi Interference Resistance to Jamming Attack ]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>66 ([http://elibrary.kubg.edu.ua/id/eprint/48321/ 48321])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMiCo61577.2023.10380360 10.1109/UkrMiCo61577.2023.10380360]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85183457098 2-s2.0-85183457098]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10380360 ZigBee Network Resistance to Jamming Attacks]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>65 ([http://elibrary.kubg.edu.ua/id/eprint/47365/ 47365])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178338434 2-s2.0-85178338434]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3550/short7.pdf Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentral-izing the Telecommunications Network]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>64 ([http://elibrary.kubg.edu.ua/id/eprint/47363/ 47363])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85178378792 2-s2.0-85178378792]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3550/short6.pdf Properties of Isogeny Graph of Non-Cyclic Edwards Curves]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>63 ([http://elibrary.kubg.edu.ua/id/eprint/47512/ 47512])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/CSIT61576.2023.10324031 10.1109/CSIT61576.2023.10324031]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179844674 2-s2.0-85179844674]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10324031 Jump-Stay Jamming Attack on Wi-Fi Systems]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>62 ([http://elibrary.kubg.edu.ua/id/eprint/46982/ 46982])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ELIT61488.2023.10310815 10.1109/ELIT61488.2023.10310815]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85179520418 2-s2.0-85179520418]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10310815 Bluetooth Low-Energy Beacon Resistance to Jamming Attack]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>61 ([http://elibrary.kubg.edu.ua/id/eprint/46792/ 46792])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85176926997 2-s2.0-85176926997]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3530/paper11.pdf Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>60 ([http://elibrary.kubg.edu.ua/id/eprint/46394/ 46394])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85175724530 2-s2.0-85175724530]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3504/paper2.pdf Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>59 ([http://elibrary.kubg.edu.ua/id/eprint/46307/ 46307])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST57299.2022.10238518 10.1109/PICST57299.2022.10238518]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85172739043 2-s2.0-85172739043]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/10238518 Method for Increasing the Various Sources Data Consistency for IoT Sensors]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>58 ([http://elibrary.kubg.edu.ua/id/eprint/45924/ 45924])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-36118-0_96 10.1007/978-3-031-36118-0_96]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85169039263 2-s2.0-85169039263]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-36118-0_96 Social Engineering Penetration Testing in Higher Education Institutions]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>57 ([http://elibrary.kubg.edu.ua/id/eprint/44602/ 44602])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1016/j.cose.2023.103198 10.1016/j.cose.2023.103198]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85150928741 2-s2.0-85150928741] (Q1)</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:001053816800001 WOS:001053816800001] (Q1)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/0167-4048 0167-4048]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1872-6208 1872-6208]</div> | ||
+ | </td> | ||
+ | <td>[https://www.sciencedirect.com/science/article/pii/S0167404823001086 Brainwave-based Authentication using Features Fusion]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>56 ([http://elibrary.kubg.edu.ua/id/eprint/45692/ 45692])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163896091 2-s2.0-85163896091]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3421/short1.pdf Smart Home Subsystem for Calculating the Quality of Public Utilities]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>55 ([http://elibrary.kubg.edu.ua/id/eprint/45691/ 45691])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85163882231 2-s2.0-85163882231]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3421/paper4.pdf CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>54 ([http://elibrary.kubg.edu.ua/id/eprint/45656/ 45656])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-35467-0_32 10.1007/978-3-031-35467-0_32]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85162953358 2-s2.0-85162953358]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-35467-0_32 Implementation of Active Cybersecurity Education in Ukrainian Higher School]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>53 ([http://elibrary.kubg.edu.ua/id/eprint/43770/ 43770])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMW58013.2022.10037124 10.1109/UkrMW58013.2022.10037124]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85149175780 2-s2.0-85149175780]</div> | ||
+ | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:001058645700077 WOS:001058645700077]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/abstract/document/10037124 Problematic Issues of the Accelerating Lens Deployment]</td> | ||
+ | <td>2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>52 ([http://elibrary.kubg.edu.ua/id/eprint/43769/ 43769])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145368917 2-s2.0-85145368917] (Q4)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div> | ||
+ | </td> | ||
+ | <td>[http://www.jatit.org/volumes/Vol100No24/18Vol100No24.pdf Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>51 ([http://elibrary.kubg.edu.ua/id/eprint/43768/ 43768])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85145479763 2-s2.0-85145479763] (Q4)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div> | ||
+ | </td> | ||
+ | <td>[http://www.jatit.org/volumes/Vol100No24/15Vol100No24.pdf Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>50 ([http://elibrary.kubg.edu.ua/id/eprint/43756/ 43756])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85146116195 2-s2.0-85146116195]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3312/paper6.pdf Prototyping Methodology of End-to-End Speech Analytics Software]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>49 ([http://elibrary.kubg.edu.ua/id/eprint/43156/ 43156])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143412570 2-s2.0-85143412570] (Q4)</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/1992-8645 1992-8645]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1817-3195 1817-3195]</div> | ||
+ | </td> | ||
+ | <td>[http://www.jatit.org/volumes/Vol100No22/18Vol100No22.pdf Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>48 ([http://elibrary.kubg.edu.ua/id/eprint/43202/ 43202])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143791399 2-s2.0-85143791399]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3288/short13.pdf Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>47 ([http://elibrary.kubg.edu.ua/id/eprint/43188/ 43188])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85143809498 2-s2.0-85143809498]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[https://ceur-ws.org/Vol-3288/paper1.pdf Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>46 ([http://elibrary.kubg.edu.ua/id/eprint/43154/ 43154])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/ELNANO54667.2022.9927105 10.1109/ELNANO54667.2022.9927105]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85142604882 2-s2.0-85142604882]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2377-6935 2377-6935]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2693-3535 2693-3535]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9927105 Video Channel Suppression Method of Unmanned Aerial Vehicles]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>45 ([http://elibrary.kubg.edu.ua/id/eprint/41953/ 41953])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137151000 2-s2.0-85137151000]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3188/short10.pdf Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>44 ([http://elibrary.kubg.edu.ua/id/eprint/41951/ 41951])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139416 2-s2.0-85137139416]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3188/paper18.pdf Decentralized Access Demarcation System Construction in Situational Center Network]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>43 ([http://elibrary.kubg.edu.ua/id/eprint/41867/ 41867])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137145539 2-s2.0-85137145539]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3187/short10.pdf Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>42 ([http://elibrary.kubg.edu.ua/id/eprint/41803/ 41803])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85137139799 2-s2.0-85137139799]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3187/paper20.pdf Natural Language Technology to Ensure the Safety of Speech Information]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>41 ([http://elibrary.kubg.edu.ua/id/eprint/41337/ 41337])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132243825 2-s2.0-85132243825]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3149/short11.pdf Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>40 ([http://elibrary.kubg.edu.ua/id/eprint/41336/ 41336])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85132269263 2-s2.0-85132269263]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3149/short8.pdf Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>39 ([http://elibrary.kubg.edu.ua/id/eprint/41190/ 41190])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.32782/cmis/3137-19 10.32782/cmis/3137-19]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130712118 2-s2.0-85130712118]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
+ | </td> | ||
+ | <td>[http://ceur-ws.org/Vol-3137/paper19.pdf Stability Verification of Self-Organized Wireless Networks with Block Encryption]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>38 ([http://elibrary.kubg.edu.ua/id/eprint/41098/ 41098])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-04809-8_53 10.1007/978-3-031-04809-8_53]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129657396 2-s2.0-85129657396]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-04809-8_53 Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>37 ([http://elibrary.kubg.edu.ua/id/eprint/41097/ 41097])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1007/978-3-031-04812-8_35 10.1007/978-3-031-04812-8_35]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85129602152 2-s2.0-85129602152]</div> | ||
+ | <div>pISSN: [https://portal.issn.org/resource/ISSN/2367-4512 2367-4512]</div> | ||
+ | <div>eISSN: [https://portal.issn.org/resource/ISSN/2367-4520 2367-4520]</div> | ||
+ | </td> | ||
+ | <td>[https://link.springer.com/chapter/10.1007/978-3-031-04812-8_35 Transferability Evaluation of Speech Emotion Recognition Between Different Languages]</td> | ||
+ | <td>2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>36 ([http://elibrary.kubg.edu.ua/id/eprint/41217/ 41217])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST54195.2021.9772181 10.1109/PICST54195.2021.9772181]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130949573 2-s2.0-85130949573]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9772181 Assessing Approaches of IT Infrastructure Audit]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>35 ([http://elibrary.kubg.edu.ua/id/eprint/41216/ 41216])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST54195.2021.9772161 10.1109/PICST54195.2021.9772161]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85130900011 2-s2.0-85130900011]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9772161 Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>34 ([http://elibrary.kubg.edu.ua/id/eprint/39482/ 39482])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120713598 2-s2.0-85120713598]</div> | ||
+ | </td> | ||
+ | <td>Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>33 ([http://elibrary.kubg.edu.ua/id/eprint/39481/ 39481])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85120677459 2-s2.0-85120677459]</div> | ||
+ | </td> | ||
+ | <td>On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>32 ([http://elibrary.kubg.edu.ua/id/eprint/40895/ 40895])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMiCo52950.2021.9716700 10.1109/UkrMiCo52950.2021.9716700]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126945180 2-s2.0-85126945180]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9716700 Technology of Location Hiding by Spoofing the Mobile Operator IP Address]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>31 ([http://elibrary.kubg.edu.ua/id/eprint/40894/ 40894])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/UkrMiCo52950.2021.9716665 10.1109/UkrMiCo52950.2021.9716665]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85126958490 2-s2.0-85126958490]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9716665 Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio]</td> | ||
+ | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>30 ([http://elibrary.kubg.edu.ua/id/eprint/36995/ 36995])</div> | ||
</td> | </td> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112360373 2-s2.0-85112360373]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112360373 2-s2.0-85112360373]</div> | ||
− | |||
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 85: | Рядок 584: | ||
<tr> | <tr> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
− | <div> | + | <div>29 ([http://elibrary.kubg.edu.ua/id/eprint/36994/ 36994])</div> |
</td> | </td> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112376265 2-s2.0-85112376265]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85112376265 2-s2.0-85112376265]</div> | ||
− | |||
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 97: | Рядок 595: | ||
<tr> | <tr> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
− | <div> | + | <div>28 ([http://elibrary.kubg.edu.ua/id/eprint/36975/ 36975])</div> |
</td> | </td> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
Рядок 109: | Рядок 607: | ||
<tr> | <tr> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
− | <div> | + | <div>27 ([http://elibrary.kubg.edu.ua/id/eprint/36974/ 36974])</div> |
</td> | </td> | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
Рядок 118: | Рядок 616: | ||
<td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_3 Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition]</td> | <td>[https://link.springer.com/chapter/10.1007/978-3-030-80472-5_3 Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition]</td> | ||
<td>2021</td> | <td>2021</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>26 ([http://elibrary.kubg.edu.ua/id/eprint/37097/ 37097])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST51311.2020.9468084 10.1109/PICST51311.2020.9468084]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114396341 2-s2.0-85114396341]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9468084 Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches]</td> | ||
+ | <td>2020</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>25 ([http://elibrary.kubg.edu.ua/id/eprint/37096/ 37096])</div> | ||
+ | </td> | ||
+ | <td style="white-space: nowrap;"> | ||
+ | <div>DOI: [https://doi.org/10.1109/PICST51311.2020.9467886 10.1109/PICST51311.2020.9467886]</div> | ||
+ | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85114397136 2-s2.0-85114397136]</div> | ||
+ | </td> | ||
+ | <td>[https://ieeexplore.ieee.org/document/9467886 Last Mile Technique for Wireless Delivery System using an Accelerating Lens]</td> | ||
+ | <td>2020</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Рядок 125: | Рядок 645: | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
<div>DOI: [https://doi.org/10.3390/electronics9122092 10.3390/electronics9122092]</div> | <div>DOI: [https://doi.org/10.3390/electronics9122092 10.3390/electronics9122092]</div> | ||
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097402923 2-s2.0-85097402923]</div> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85097402923 2-s2.0-85097402923] (Q2)</div> |
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000602048000001 WOS:000602048000001] (Q2)</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/2079-9292 2079-9292]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/2079-9292 2079-9292]</div> | ||
</td> | </td> | ||
Рядок 149: | Рядок 669: | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096935822 2-s2.0-85096935822]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096935822 2-s2.0-85096935822]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800001 WOS:000651092800001]</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 161: | Рядок 681: | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096946608 2-s2.0-85096946608]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85096946608 2-s2.0-85096946608]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000651092800003 WOS:000651092800003]</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 210: | Рядок 730: | ||
<div>DOI: [https://doi.org/10.5281/zenodo.3895814 10.5281/zenodo.3895814]</div> | <div>DOI: [https://doi.org/10.5281/zenodo.3895814 10.5281/zenodo.3895814]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088881294 2-s2.0-85088881294]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088881294 2-s2.0-85088881294]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800005 WOS:000664104800005]</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 223: | Рядок 743: | ||
<div>DOI: [https://doi.org/10.5281/zenodo.3929541 10.5281/zenodo.3929541]</div> | <div>DOI: [https://doi.org/10.5281/zenodo.3929541 10.5281/zenodo.3929541]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088879005 2-s2.0-85088879005]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85088879005 2-s2.0-85088879005]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664104800003 WOS:000664104800003]</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 249: | Рядок 769: | ||
<div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235492 10.1109/TCSET49122.2020.235492]</div> | <div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235492 10.1109/TCSET49122.2020.235492]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086312920 2-s2.0-85086312920]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086312920 2-s2.0-85086312920]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000113 WOS:000578041000113]</div> |
</td> | </td> | ||
<td>[https://ieeexplore.ieee.org/document/9088628/ Bandwidth Research of Wireless IoT Switches]</td> | <td>[https://ieeexplore.ieee.org/document/9088628/ Bandwidth Research of Wireless IoT Switches]</td> | ||
Рядок 261: | Рядок 781: | ||
<div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235583 10.1109/TCSET49122.2020.235583]</div> | <div>DOI: [https://doi.org/10.1109/TCSET49122.2020.235583 10.1109/TCSET49122.2020.235583]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086313460 2-s2.0-85086313460]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85086313460 2-s2.0-85086313460]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000578041000204 WOS:000578041000204]</div> |
</td> | </td> | ||
<td>[https://ieeexplore.ieee.org/document/9088514/ Sustainability Research of the Secure Wireless Communication System with Channel Reservation]</td> | <td>[https://ieeexplore.ieee.org/document/9088514/ Sustainability Research of the Secure Wireless Communication System with Channel Reservation]</td> | ||
Рядок 306: | Рядок 826: | ||
<td style="white-space: nowrap;"> | <td style="white-space: nowrap;"> | ||
<div>DOI: [https://doi.org/10.15587/1729-4061.2019.181943 10.15587/1729-4061.2019.181943]</div> | <div>DOI: [https://doi.org/10.15587/1729-4061.2019.181943 10.15587/1729-4061.2019.181943]</div> | ||
− | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85075389262 2-s2.0-85075389262]</div> | + | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85075389262 2-s2.0-85075389262] (Q2)</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1729-4061 1729-4061]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1729-4061 1729-4061]</div> | ||
<div>pISSN: [https://portal.issn.org/resource/ISSN/1729-3774 1729-3774]</div> | <div>pISSN: [https://portal.issn.org/resource/ISSN/1729-3774 1729-3774]</div> | ||
Рядок 320: | Рядок 840: | ||
<div>DOI: [https://doi.org/10.28925/2663-4023.2019.4.90103 10.28925/2663-4023.2019.4.90103]</div> | <div>DOI: [https://doi.org/10.28925/2663-4023.2019.4.90103 10.28925/2663-4023.2019.4.90103]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85072951424 2-s2.0-85072951424]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85072951424 2-s2.0-85072951424]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000565635700002 WOS:000565635700002] (Q4)</div> |
<div>pISSN: [https://portal.issn.org/resource/ISSN/0302-9743 0302-9743]</div> | <div>pISSN: [https://portal.issn.org/resource/ISSN/0302-9743 0302-9743]</div> | ||
<div>eISSN: [https://portal.issn.org/resource/ISSN/1611-3349 1611-3349]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1611-3349 1611-3349]</div> | ||
Рядок 334: | Рядок 854: | ||
<div>DOI: [https://doi.org/10.1109/infocommst.2018.8632151 10.1109/INFOCOMMST.2018.8632151]</div> | <div>DOI: [https://doi.org/10.1109/infocommst.2018.8632151 10.1109/INFOCOMMST.2018.8632151]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85062891053 2-s2.0-85062891053]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85062891053 2-s2.0-85062891053]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000458659100109 WOS:000458659100109]</div> |
</td> | </td> | ||
<td>[https://ieeexplore.ieee.org/document/8632151/ Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers]</td> | <td>[https://ieeexplore.ieee.org/document/8632151/ Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers]</td> | ||
Рядок 346: | Рядок 866: | ||
<div>DOI: [https://doi.org/10.2139/ssrn.3455453 10.2139/ssrn.3455453]</div> | <div>DOI: [https://doi.org/10.2139/ssrn.3455453 10.2139/ssrn.3455453]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068084320 2-s2.0-85068084320]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068084320 2-s2.0-85068084320]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100021 WOS:000664097100021]</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
<div>eISSN: [https://portal.issn.org/resource/ISSN/1556-5068 1556-5068]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1556-5068 1556-5068]</div> | ||
Рядок 360: | Рядок 880: | ||
<div>DOI: [https://doi.org/10.5281/zenodo.3256219 10.5281/zenodo.3256219]</div> | <div>DOI: [https://doi.org/10.5281/zenodo.3256219 10.5281/zenodo.3256219]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068053861 2-s2.0-85068053861]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85068053861 2-s2.0-85068053861]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000664097100017 WOS:000664097100017]</div> |
<div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | <div>eISSN: [https://portal.issn.org/resource/ISSN/1613-0073 1613-0073]</div> | ||
</td> | </td> | ||
Рядок 373: | Рядок 893: | ||
<div>DOI: [https://doi.org/10.1109/infocommst.2017.8246463 10.1109/INFOCOMMST.2017.8246463]</div> | <div>DOI: [https://doi.org/10.1109/infocommst.2017.8246463 10.1109/INFOCOMMST.2017.8246463]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85046096370 2-s2.0-85046096370]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85046096370 2-s2.0-85046096370]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000426514100127 WOS:000426514100127]</div> |
</td> | </td> | ||
<td>[http://ieeexplore.ieee.org/document/8246463/ Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network]</td> | <td>[http://ieeexplore.ieee.org/document/8246463/ Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network]</td> | ||
Рядок 385: | Рядок 905: | ||
<div>DOI: [https://doi.org/10.1109/ICATT.2017.7972671 10.1109/ICATT.2017.7972671]</div> | <div>DOI: [https://doi.org/10.1109/ICATT.2017.7972671 10.1109/ICATT.2017.7972671]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85027453269 2-s2.0-85027453269]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-85027453269 2-s2.0-85027453269]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000426507800086 WOS:000426507800086]</div> |
</td> | </td> | ||
<td>[http://ieeexplore.ieee.org/document/7972671/ Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane]</td> | <td>[http://ieeexplore.ieee.org/document/7972671/ Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane]</td> | ||
Рядок 397: | Рядок 917: | ||
<div>DOI: [https://doi.org/10.1109/ICATT.2015.7136852 10.1109/ICATT.2015.7136852]</div> | <div>DOI: [https://doi.org/10.1109/ICATT.2015.7136852 10.1109/ICATT.2015.7136852]</div> | ||
<div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84939458540 2-s2.0-84939458540]</div> | <div>EID: [http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-84939458540 2-s2.0-84939458540]</div> | ||
− | <div>ISI: [ | + | <div>ISI: [https://www.webofscience.com/wos/woscc/full-record/WOS:000381609800077 WOS:000381609800077]</div> |
</td> | </td> | ||
<td>[http://ieeexplore.ieee.org/document/7136852/ Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems]</td> | <td>[http://ieeexplore.ieee.org/document/7136852/ Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems]</td> | ||
Рядок 494: | Рядок 1014: | ||
<th>Оцінка студентів</th> | <th>Оцінка студентів</th> | ||
<th>Дата</th> | <th>Дата</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>6339</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td> | ||
+ | <td style="text-align:center;">4,76</td> | ||
+ | <td>30.12.2023</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>5455</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td> | ||
+ | <td style="text-align:center;">4,92</td> | ||
+ | <td>30.12.2022</td> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>4759</td> | ||
+ | <td>Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка</td> | ||
+ | <td style="text-align:center;">4,96</td> | ||
+ | <td>28.12.2021</td> | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
Рядок 514: | Рядок 1052: | ||
</tr> | </tr> | ||
</table> | </table> | ||
+ | |||
+ | |||
+ | [[Категорія:Портфоліо викладача/Факультет інформаційних технологій та математики/Кафедра інформаційної та кібернетичної безпеки]] | ||
+ | [[Категорія:Кафедра інформаційної та кібернетичної безпеки ім. професора Володимира Бурячка]] |
Версія за 09:36, 6 серпня 2024
Зміст
Е-портфоліо
(#1 у загальному рейтингу)
Додаткові відомості
Освіта
2008 | State University of Telecommunications: Kyiv, UA | Department of Information Security | Postgraduate studies
2005 | Kyiv Polytechnic Institute: Kyiv, UA | Faculty of Electronics | Master of Electronic Engineering
Перелік місць роботи
2018 to present | Borys Grinchenko Kyiv University: Kyiv, UA | Department of Information and Cyber Security | Senior lecturer
2005 to 2018 | State University of Telecommunications: Kyiv, UA | Department of Information Security | Senior lecturer
Теми дисертацій (захищених)
10/29/2019 | Methods and Means of Enhancing Information and Functional Security of Wireless Data Networks | Institute of Telecommunications and Global Information Space: Kyiv, UA | PhD in IT
Громадська активність
European Microwave Association (EuMA): Louvain-la-Neuve, BE Center for Internet Security (CIS): East Greenbush, NY, US Malware Information Sharing Platform (MISP): Bethesda, MD, US International Telecommunication Union (ITU): Geneva, CH Internet Society (IS): Reston, VA, US
Науково-дослідницька діяльність
Індекси цитування | |||
---|---|---|---|
Джерело | Бібліографічні посилання | h-індекс | Дата |
Scopus | 73 | 18 | 04.05.2024 |
WoS | 16 | 4 | 13.06.2024 |
Research Gate | 103 | 12 | 06.04.2024 |
Google Scholar | 146 | 20 | 06.04.2024 |
Професійний розвиток
Захист кандидатської дисертації | ||||||
---|---|---|---|---|---|---|
ID | Науковий керівник | Тема дисертації | Наукова спеціальність, місце захисту | Наукова спеціальність, місце, форма, роки навчання в аспірантурі | Копія диплому | Рік захисту |
63 | Бурячок Володимир Леонідович, д.т.н., професор | Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних | 05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ) | 05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008 | 2019 |
Викладацька діяльність
Підручники, навчальні посібники (колективні) | ||
---|---|---|
ID | Назва | Рік |
27294 | Безпека безпровідних і мобільних мереж | 2019 |
27191 | Технології забезпечення безпеки мережевої інфраструктури | 2019 |
Навчальні та методичні матеріали | ||
---|---|---|
ID | Назва | Рік |
27053 | Ініціатива CDIO | 2019 |
29432 | Керівництво по eduScrum. Правила гри | 2019 |
Рейтинг викладачів серед студентів | |||
---|---|---|---|
ID | Підрозділ | Оцінка студентів | Дата |
6339 | Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка | 4,76 | 30.12.2023 |
5455 | Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка | 4,92 | 30.12.2022 |
4759 | Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка | 4,96 | 28.12.2021 |
4053 | Кафедра інформаційної та кібернетичної безпеки | 4,82 | 28.12.2020 |
2982 | Кафедра інформаційної та кібернетичної безпеки | 4,74 | 28.12.2019 |
2290 | Кафедра інформаційної та кібернетичної безпеки | 4,88 | 27.12.2018 |