1933 бали (2-е місце) за 2022
982 бали (9-е місце) за 2021
1351 бал (3-е місце) за 2020
814 балів (4-е місце) за 2019
103 бали (172-е місце) за 2018
Публікації у виданнях, що входять до наукометричних баз даних Scopus і WOS |
ID |
Indices |
Назва |
Рік |
|
</td>
| Bluetooth Low-Energy Beacon Resistance to Jamming Attack</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Dynamic Model of Guarantee Capacity and Cyber Security Management in the Critical Automated System</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Method for Increasing the Various Sources Data Consistency for IoT Sensors</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Social Engineering Penetration Testing in Higher Education Institutions</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Brainwave-based Authentication using Features Fusion</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Smart Home Subsystem for Calculating the Quality of Public Utilities</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Implementation of Active Cybersecurity Education in Ukrainian Higher School</td>
| 2023</td>
</tr>
|
</td>
|
</td>
| Problematic Issues of the Accelerating Lens Deployment</td>
| 2023</td>
</tr>
|
52
</td>
|
</td>
| Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models</td>
| 2022</td>
</tr>
|
51
</td>
|
</td>
| Application of Game Theory, Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Prototyping Methodology of End-to-End Speech Analytics Software</td>
| 2022</td>
</tr>
|
49
</td>
|
</td>
| Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network </td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Video Channel Suppression Method of Unmanned Aerial Vehicles</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Decentralized Access Demarcation System Construction in Situational Center Network</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Natural Language Technology to Ensure the Safety of Speech Information</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Increasing the Functional Network Stability in the Depression Zone of the Hydroelectric Power Station Reservoir</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Stability Verification of Self-Organized Wireless Networks with Block Encryption</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Transferability Evaluation of Speech Emotion Recognition Between Different Languages</td>
| 2022</td>
</tr>
|
</td>
|
</td>
| Assessing Approaches of IT Infrastructure Audit</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Method for Determining Areas of Stable Solutions of Inverse Problems of Mathematical Physics by the Example of Well Electrometry</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| On the Use of Gray Codes for Solving 0-1 Combinatorial Problems of Optimization and Decision-Making in Environmental and Economic Systems</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Technology of Location Hiding by Spoofing the Mobile Operator IP Address</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Analysis of Automatic Speech Recognition Methods</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Authentication System by Human Brainwaves Using Machine Learning and Artificial Intelligence</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Automated Pipeline for Training Dataset Creation from Unlabeled Audios for Automatic Speech Recognition</td>
| 2021</td>
</tr>
|
</td>
|
</td>
| Sentence Segmentation from Unformatted Text using Language Modeling and Sequence Labeling Approaches</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Last Mile Technique for Wireless Delivery System using an Accelerating Lens</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Wireless Sensors for Brain Activity — A Survey</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Experimental Evaluation of an Accelerating Lens on Spatial Field Structure and Frequency Spectrum</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Implementation of Social Engineering Attack at Institution of Higher Education</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Experimental Evaluation of Phishing Attack on High School Students</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Metaphone Phonetic Algorithm for Ukrainian Last Names, Medicinal Names, and Toponyms</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Techniques Comparison for Natural Language Processing</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4–2.5 GHz Range</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Bandwidth Research of Wireless IoT Switches</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Sustainability Research of the Secure Wireless Communication System with Channel Reservation</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Analysis of Implementation Results of the Distributed Access Control System</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Investigation of Availability of Wireless Access Points based on Embedded Systems</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Implementation of Active Learning in the Master’s Program on Cybersecurity</td>
| 2020</td>
</tr>
|
</td>
|
</td>
| Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Investigation of the IoT Device Lifetime with Secure Data Transmission</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Monitoring Subsystem for Wireless Systems based on Miniature Spectrum Analyzers</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio</td>
| 2019</td>
</tr>
|
</td>
|
</td>
| Security Rating Metrics for Distributed Wireless Systems</td>
| 2019</td>
</tr>
|
4
</td>
|
</td>
| Scheme for Dynamic Channel Allocation with Interference Reduction in Wireless Sensor Network</td>
| 2017</td>
</tr>
|
3
</td>
|
</td>
| Experimental Evaluation of the Shading Effect of Accelerating Lens in Azimuth Plane</td>
| 2017</td>
</tr>
|
2
</td>
|
</td>
| Modified Accelerating Lens as a Means of Increasing the Throughput, Range and Noise Immunity of IEEE 802.11 Systems</td>
| 2015</td>
</tr>
|
1
</td>
|
</td>
| Research Results of the Impact of Spatial and Polarization Value of the Antennas on Network Capacity of Wireless Channels Standard IEEE 802.11</td>
| 2013</td>
</tr>
</table>
Професійний розвиток
Захист кандидатської дисертації |
ID |
Науковий керівник |
Тема дисертації |
Наукова спеціальність, місце захисту |
Наукова спеціальність, місце, форма, роки навчання в аспірантурі |
Копія диплому |
Рік захисту |
63 |
Бурячок Володимир Леонідович, д.т.н., професор |
Методи і засоби підвищення інформаційної та функціональної безпеки безпроводових мереж передавання даних |
05.13.06 "Інформаційні технологій", Інститут телекомунікацій і глобального інформаційного простору НАН України (Київ) |
05.13.21 "Системи захисту інформації", Державний університет телекомунікацій (Київ), денна, 2005–2008 |
|
2019 |
Викладацька діяльність
Рейтинг викладачів серед студентів |
ID |
Підрозділ |
Оцінка студентів |
Дата |
5455 |
Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка |
4,92 |
30.12.2022 |
4759 |
Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка |
4,96 |
28.12.2021 |
4053 |
Кафедра інформаційної та кібернетичної безпеки |
4,82 |
28.12.2020 |
2982 |
Кафедра інформаційної та кібернетичної безпеки |
4,74 |
28.12.2019 |
2290 |
Кафедра інформаційної та кібернетичної безпеки |
4,88 |
27.12.2018 |
|