default search action
Sergiy Gnatyuk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Nurgul A. Seilova, Sergiy Gnatyuk, Askhat A. Batyrgaliyev, Zhanibek A. Dzhangozin, Dana A. Baibatchayeva, Nurbol Nurgabylov, Renat Ibraev:
Method for Assessing Noise Quality Based on Entropy Quality Factor. Int. J. Comput. 23(2): 187-195 (2024) - [c68]Bayan Abduraimova, Sergiy Gnatyuk, Albina Nurmukhanbetova:
Comparative study of machine learning applications in malware forensics. CPITS II 2024: 139-152 - [c67]Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Volodymyr Sokolov:
Method for managing IT incidents in critical information infrastructure facilities (short paper). CPITS II 2024: 326-333 - [c66]Maksim Iavich, Sergiy Gnatyuk, Assel Mukasheva:
Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience (short paper). CPITS II 2024: 342-349 - [c65]Vladimer Svanadze, Maksim Iavich, Sergiy Gnatyuk:
Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper). CPITS 2024: 497-504 - [c64]Sakhybay Tynymbayev, Sergiy Gnatyuk, Margulan Ibraimov, Timur Namazbayev, Assel Mukasheva:
Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper). CPITS 2024: 513-519 - [c63]Dmytro Proskurin, Tetiana Okhrimenko, Sergiy Gnatyuk, Dauriya Zhaksigulova, Nataliia Korshun:
Hybrid RNN-CNN-based model for PRNG identification (short paper). CQPC 2024: 47-53 - [c62]Maksim Iavich, Oksana Kovalchuk, Sergiy Gnatyuk, Yuliia Khavikova, Volodymyr Sokolov:
Classical and post-quantum encryption for GDPR (short paper). CQPC 2024: 70-78 - [c61]Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Andrii Paziuk, Artem Polozhentsev:
Experimental study of the model for calculating the quantitative criteria for assessing the security level of information and communication systems of the state critical infrastructure (short paper). CSDP 2024: 81-89 - [c60]Berik Akhmetov, Sergiy Gnatyuk, Bakhytzhan Akhmetov, Bauyrzhan Tynymbayev:
Analysis of modern LMS platforms in Kazakhstan: Structure, functionality, cybersecurity (short paper). CSDP 2024: 106-113 - [c59]Maksim Iavich, Sergei Simonov, Sergiy Gnatyuk:
Building C2 servers for the assessment of AI based antiviruses. SCIA 2024 - [e5]Taras Maksymyuk, Orest Kochan, Mikolaj P. Karpinski, Axel Sikora, Michal Podpora, Sergiy Gnatyuk:
Proceedings of the Cyber Security and Data Protection, Lviv, Ukraine, June 30, 2024. CEUR Workshop Proceedings 3800, CEUR-WS.org 2024 [contents] - [e4]Pavlo Zhezhnych, Oleksandr Markovets, Alina Petrushka, Sergiy Gnatyuk:
Proceedings of the 3rd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2024), Lviv, Ukraine, October 31, 2024. CEUR Workshop Proceedings 3851, CEUR-WS.org 2024 [contents] - 2023
- [c58]Sergiy Gnatyuk, Dauriya Zhaksigulova, Oksana Zhyharevych, Dinara Ospanova, Iryna Chuba:
Studies on WSN Models for IoT-based Monitoring Systems in the Critical Infrastructure of the State. CPITS II 2023: 167-180 - [c57]Sergiy Gnatyuk, Feruza Satybaldiyeva, Viktoriia Sydorenko, Oksana Zhyharevych, Artem Polozhentsev:
Model of Information Technology for Efficient Data Processing in Cloud-based Malware Detection Systems of Critical Information Infrastructure (short paper). CPITS 2023: 206-213 - [c56]Sakhybay Tynymbayev, Sergiy Gnatyuk, Rat Berdibayev, Kaiyrbek Makulov, Tetiana Okhrimenko:
Modular Matrix Multiplication for Cryptographic Conversions (short paper). CQPC 2023: 57-62 - [c55]Sergiy Gnatyuk, Andrew Okhrimenko, Denys Navrotskyi, Dmytro Proskurin, Bohdan Horbakha:
Dataset of Cryptographic Algorithms for UAV Image Encryption based on Artificial Neural Networks (short paper). CQPC 2023: 63-71 - [c54]Maksym Lutskyi, Sergiy Gnatyuk, Viktoriia Sydorenko, Stanislav Yarotskiy, Artem Polozhentsev:
Study on the Evaluating the Degree of Investment Attractiveness of It-Projects. DESSERT 2023: 1-7 - [c53]Dmytro Proskurin, Sergiy Gnatyuk, Tetiana Okhrimenko, Maksim Iavich:
ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security. IDAACS 2023: 1025-1030 - [c52]Artem Polozhentsev, Sergiy Gnatyuk, Rat Berdibayev, Viktoriia Sydorenko, Oksana Zhyharevych:
Novel Cyber Incident Management System for 5G-based Critical Infrastructures. IDAACS 2023: 1037-1041 - [c51]Ivan Azarov, Sergiy Gnatyuk, Marek Aleksander, Ilya Azarov, Assel Mukasheva:
Real-time ML algorithms for the detection of dangerous objects in critical infrastructures. IntelITSIS 2023: 217-226 - [c50]Aasso Ziro, Sergiy Gnatyuk, Shara Toibayeva:
Improved Method for Penetration Testing of Web Applications. IntelITSIS 2023: 518-528 - [c49]Dmytro Proskurin, Sergiy Gnatyuk, Tetiana Okhrimenko:
Predicting Pseudo-Random and Quantum Random Number Sequences using Hybrid Deep Learning Models. MoMLeT+DS 2023: 77-88 - [c48]Lesya Kovalska, Tetiana Yavorska, Hryhorii Kovalskyi, Sergiy Gnatyuk:
Modern Challenges of the Activities of Document and Information Institutions. SCIA 2023: 275-287 - [e3]Sergiy Gnatyuk, Zhengbing Hu, Roman Odarchenko, Jamil Al-Azzeh, Maksym Zaliskyi:
2nd International Conference on Conflict Management in Global Information Networks (CMiGIN 2022), Kyiv, Ukraine, November 30, 2022. CEUR Workshop Proceedings 3530, CEUR-WS.org 2023 [contents] - 2022
- [j3]Azamat Imanbayev, Sakhybay Tynymbayev, Roman Odarchenko, Sergiy Gnatyuk, Rat Berdibayev, Alimzhan Baikenov, Nargiz Kaniyeva:
Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond. Sensors 22(24): 9957 (2022) - [c47]Anastasiia Vavilenkova, Sergiy Gnatyuk:
Ways of spinning implementation in complex natural language sentences. CMiGIN 2022: 173-181 - [c46]Olena Chebanyuk, Vitalii Velychko, Olexander Palahin, Sergiy Gnatyuk:
Conceptual basics of semantic comparison texts in social networks. CMiGIN 2022: 203-212 - [c45]Sergiy Gnatyuk, Rat Berdibayev, Viktoriia Sydorenko, Artem Polozhentsev, Myroslav Ryabyy:
Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure. CPITS 2022: 11-20 - [c44]Sergiy Gnatyuk, Oleksiy Yudin, Viktoriia Sydorenko, Tetiana Smirnova, Artem Polozhentsev:
The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems. IntelITSIS 2022: 390-399 - [c43]Maksym Lutskyi, Sergiy Gnatyuk, Oleksii Verkhovets, Artem Polozhentsev:
Information Flows Formalization for BSD Family Operating Systems Security Against Unauthorized Investigation. ITEST 2022: 235-246 - [c42]Maksim Iavich, Giorgi Iashvili, Roman Odarchenko, Sergiy Gnatyuk, Avtandil Gagnidze:
Developing Security Recommender System Using Content-Based Filtering Mechanisms. ITEST 2022: 619-634 - [c41]Maksim Iavich, Sergiy Gnatyuk, Giorgi Iashvili, Roman Odarchenko, Sergei Simonov:
5G Security Function and Its Testing Environment. ITEST 2022: 656-678 - [c40]Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Oksana Zhyharevych, Artem Polozhentsev:
Method for Calculating the Criticality Level of Sectoral Information and Telecommunication Systems. IT&I 2022: 234-245 - 2021
- [c39]Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Razvan Bocu, Sergei Simonov:
The Novel System of Attacks Detection in 5G. AINA (2) 2021: 580-591 - [c38]Sergiy Gnatyuk, Dinara Ospanova, Volodymyr Lytvynenko, Zhazira Amirgaliyeva, Nurali Nabot Shohiyon:
Assessing Risk of Enterprise Bankruptcy by Indicators of Financial and Economic Activity Using Bayesian Networks. CITRisk 2021: 39-50 - [c37]Dmytro Proskurin, Sergiy Gnatyuk, Madina Bauyrzhan:
Distributive Training can Improve Neural Network Performance based on RL-CNN Architecture. CPITS II (1) 2021: 48-57 - [c36]Sergiy Gnatyuk, Rat Berdibayev, Zhadyra Avkurova, Oleksii Verkhovets, Madina Bauyrzhan:
Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure. CPITS I 2021: 68-80 - [c35]Sergiy Gnatyuk, Rat Berdibayev, Ivan Azarov, Nazerke Baisholan, Iryna Lozova:
Modern Types of Databases for SIEM System Development. CPITS II (1) 2021: 127-138 - [c34]Sergiy Gnatyuk, Rat Berdibayev, Andriy Fesenko, Olha Kyryliuk, Anatoly Bessalov:
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare. CPITS II (2) 2021: 149-166 - [c33]Razvan Bocu, Maksim Iavich, Sergiy Gnatyuk, Dinara Ospanova, Yuliia Sotnichenko:
Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices. CPITS I 2021: 164-174 - [c32]Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Solomiia Fedushko, Yuriy Syerov, Olha Trach:
Models for early web-attacks detection and intruders identification based on fuzzy logic. EUSPN/ICTH 2021: 694-699 - [c31]Sergiy Gnatyuk, Rat Berdibayev, Tetiana Smirnova, Zhadyra Avkurova, Maksim Iavich:
Cloud-Based Cyber Incidents Response System and Software Tools. ICIST 2021: 169-184 - [c30]Maksim Iavich, Giorgi Iashvili, Sergiy Gnatyuk, Andrii Tolbatov, Lela Mirtskhulava:
Efficient and Secure Digital Signature Scheme for Post Quantum Epoch. ICIST 2021: 185-193 - [c29]Giorgi Iashvili, Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Sergei Simonov:
Simulated Test Laboratory for 5G Test Patterns. IDAACS 2021: 521-526 - [c28]Giorgi Iashvili, Maksim Iavich, Razvan Bocu, Roman Odarchenko, Sergiy Gnatyuk:
Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks. IDAACS 2021: 861-864 - [c27]Serge Olszewski, Violetta Demchenko, Eva Zaets, Volodymyr Lytvynenko, Irina Lurie, Oleg Boskin, Sergiy Gnatyuk:
Streaming Algorithm to the Decomposition of a Polyatomic Molecules Mass Spectra on the Polychlorinated Biphenyls Molecule Example. ISDMCI 2021: 39-53 - [c26]Sergiy Gnatyuk, Oleksiy Yudin, Viktoriia Sydorenko, Artem Polozhentsev, Rashit Brzhanov:
Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems. IT&I Workshops 2021: 272-283 - [c25]Giorgi Labadze, Maksim Iavich, Giorgi Iashvili, Avtandil Gagnidze, Sergiy Gnatyuk:
Post-Quantum Digital Signature Scheme with BB84 Protocol. IVUS 2021: 35-44 - 2020
- [j2]Berik Akhmetov, Sergiy Gnatyuk, Vasyl Kinzeryavyy, Khalicha Yubuzova:
Studies on Practical Cryptographic Security Analysis for Block Ciphers with Random Substitutions. Int. J. Comput. 19: 298-308 (2020) - [c24]Sergiy Gnatyuk, Viktoriia Sydorenko, Oleh Polihenko, Yuliia Sotnichenko, Olena Nechyporuk:
Studies on the Disasters Criticality Assessment in Aviation Information Infrastructure. CITRisk 2020: 282-296 - [c23]Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Andriy Fesenko, Nurbol Akatayev, Gulnaz Zhilkishbayeva:
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State. COAPSN 2020: 332-341 - [c22]Sergiy Gnatyuk, Tetiana Okhrimenko, Olena Azarenko, Andriy Fesenko, Rat Berdibayev:
Experimental Study of Secure PRNG for Q-trits Quantum Cryptography Protocols. DESSERT 2020: 183-188 - [c21]Sergiy Gnatyuk, Vasyl Kinzeryavyy, Maksim Iavich, Roman Odarchenko, Rat Berdibayev, Yuliia Burmak:
Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher. ICST 2020: 202-213 - [c20]Viktoriia Sydorenko, Sergiy Gnatyuk, Andriy Fesenko, Yaroslav Yevchenko, Andrii Tolbatov, Yuliia Sotnichenko:
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation. ICTERI Workshops 2020: 136-156 - [c19]Sergiy Gnatyuk, Maksim Iavich, Vasyl Kinzeryavyy, Tetyana Okhrimenko, Yuliia Burmak, Iuliia Goncharenko:
Improved Secure Stream Cipher for Cloud Computing. ICTERI Workshops 2020: 183-197 - [c18]Nataliia Lukova-Chuiko, Andriy Fesenko, Hanna Papirna, Sergiy Gnatyuk:
Threat Hunting as a Method of Protection Against Cyber Threats. IT&I 2020: 103-113 - [c17]Giorgi Iashvili, Maksim Iavich, Avtandil Gagnidze, Sergiy Gnatyuk:
Increasing Usability of TLS Certificate Generation Process Using Secure Design. IVUS 2020: 35-41 - [e2]Solomiia Fedushko, Sergiy Gnatyuk, Andriy Peleshchyshyn, Zhengbing Hu, Roman Odarchenko, Igor Korobiichuk:
Proceedings of the International Workshop on Conflict Management in Global Information Networks (CMiGIN 2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Lviv, Ukraine, November 29, 2019. CEUR Workshop Proceedings 2588, CEUR-WS.org 2020 [contents] - [e1]Sergiy Gnatyuk, Solomiia Fedushko, Zhengbing Hu, Roman Odarchenko, Yuriy Syerov, Andriy Peleshchyshyn, Igor Korobiichuk:
Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019. CEUR Workshop Proceedings 2654, CEUR-WS.org 2020 [contents]
2010 – 2019
- 2019
- [c16]Sergiy Gnatyuk, Nataliia Barchenko, Olena Azarenko, Andrii Tolbatov, Victor Obodiak, Volodymyr Tolbatov:
Ergonomic Support for Decision-Making Management of the Chief Information Security Officer. CMiGIN 2019: 459-471 - [c15]Olena Kovtun, Nataliia Khaidari, Tetiana Harmash, Nataliia Melnyk, Sergiy Gnatyuk:
Communication in Civil Aviation: Linguistic Analysis for Educational Purposes. CMiGIN 2019: 483-495 - [c14]Andriy Peleschyshyn, Tetiana Klynina, Sergiy Gnatyuk:
Legal Mechanism of Counteracting Information Aggression in Social Networks: from Theory to Practice. COAPSN 2019: 111-121 - [c13]Sergiy Gnatyuk, Marek Aleksander, Petro Vorona, Yuliia Polishchuk, Jamilya Akhmetova:
Network-centric Approach to Destructive Manipulative Influence Evaluation in Social Media. COAPSN 2019: 273-285 - [c12]Sergiy Gnatyuk, Jamilya Akhmetova, Viktoriia Sydorenko, Yuliia Polishchuk, Valentyn Petryk:
Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion. COLINS 2019: 71-83 - [c11]Oleksii Pysarchuk, Andriy Gizun, Andriy Dudnik, Vladyslav Griga, Tetyana Domkiv, Sergiy Gnatyuk:
Bifurcation Prediction Method for the Emergence and Development Dynamics of Information Conflicts in Cybernetic Space. CybHyg 2019: 692-709 - [c10]Sakhybay Tynymbayev, Rat Berdibayev, Turganbek Omar, Sergiy Gnatyuk, Timur Namazbayev, Sairan Adilbekkyzy:
Devices for Modular Multiplication of Numbers with Analysis of Two Least Significant Bits of the Multiplier. CybHyg 2019: 762-772 - [c9]Vadym Kalchenko, Nataliia Barchenko, Andrii Tolbatov, Victor Obodiak, Volodymyr Tolbatov, Vadym Tatarinov, Sergiy Gnatyuk:
System for Monitoring the Connection of USB Devices for Cybersecurity Auditing. CybHyg 2019: 773-785 - [c8]Sergiy Gnatyuk, Viktoriia Sydorenko, Iuliia Goncharenko, Yuliia Sotnichenko, Nurgul A. Seilova, Dinara Basshykyzy:
Experimental Identification of the Critical Information Infrastructure Objects in Aviation. CybHyg 2019: 798-809 - [c7]Zhengbing Hu, Sergiy Gnatyuk, Tetyana Okhrimenko, Vasyl Kinzeryavyy, Maksim Iavich, Khalicha Yubuzova:
High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits. ICTERI Workshops 2019: 810-821 - [c6]Alaa Edein Qoussini, Yousef Ibrahim Daradkeh, Shaima Mohammad Al Tabib, Sergiy Gnatyuk, Tetyana Okhrimenko, Vasyl Kinzeryavyy:
Improved Model of Quantum Deterministic Protocol Implementation in Channel with Noise. IDAACS 2019: 572-578 - [c5]Maksim Iavich, Avtandil Gagnidze, Giorgi Iashvili, Sergiy Gnatyuk, Vira Vialkova:
Lattice based merkle. IVUS 2019: 13-16 - 2018
- [j1]Jamil Al-Azzeh, Abdelwadood Mesleh, Zhengbing Hu, Roman Odarchenko, Sergiy Gnatyuk, Anastasiia Abakumova:
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks. Int. J. Commun. Networks Inf. Secur. 10(3) (2018) - [c4]Sergiy Gnatyuk, Viktor Gnatyuk, Volodymyr Klimchuk, Eugene Samoylik, Dmytro Prysiazhnyy, Volodymyr Buryachok:
Synthesis of a Quite Proof Cryptosystem with Increased Unicity Distance for Cloud Computing. ICTERI Workshops 2018: 596-607 - [c3]Sergiy Gnatyuk, Vasyl Kinzeryavyy, Maksim Iavich, Dmytro Prysiazhnyi, Khalicha Yubuzova:
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks. ICTERI Workshops 2018: 657-668 - [c2]Maksym Zalisky, Roman Odarchenko, Sergiy Gnatyuk, Yuliia Petrova, Anastasiia Chaplits:
Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks. IDDM 2018: 193-204 - 2016
- [p1]Sergiy Gnatyuk:
Critical Aviation Information Systems Cybersecurity. Meeting Security Challenges Through Data Analytics and Decision Support 2016: 308-316 - 2015
- [c1]Sergiy Gnatyuk, Tetyana Zhmurko, Pawel Falat:
Efficiency increasing method for quantum secure direct communication protocols. IDAACS 2015: 468-472 - 2010
- [i1]Oleksandr Korchenko, Yevhen Vasiliu, Sergiy Gnatyuk:
Modern Quantum Technologies of Information Security. CoRR abs/1005.5553 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint