Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Vitalii Susukailo"'
Autor:
Vitalii Susukailo
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 2, Iss 14, Pp 26-35 (2021)
У даній статті подано дослідження використання підходу DevSecOps для аналізу сучасних загроз. Визначення методології для реалізації та ада
Externí odkaz:
https://doaj.org/article/dba4a230d6f441deac4347806faeabd9
Autor:
Serhii Pohasii, Serhii Yevseiev, Oleksandr Zhuchenko, Oleksandr Milov, Volodymyr Lysechko, Oleksandr Kovalenko, Maryna Kostiak, Andrii Volkov, Aleksandr Lezik, Vitalii Susukailo
Publikováno v:
Eastern-European Journal of Enterprise Technologies. 2:44-59
The results of developing post-quantum algorithms of McEliece and Niederreiter crypto-code constructs based on LDPC (Low-Density Parity-Check) codes are presented. With the rapid growth of computing capabilities of mobile technologies and the creatio
The object of research are decoys with dynamic attributes. This paper discusses the impact of decoys involving blockchain technologies on the state of information security of the organization and the process of researching cybercrime. This is importa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::285dd9277152bfe71f7f14a66331b6aa
https://zenodo.org/record/7737993
https://zenodo.org/record/7737993
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9783030924331
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1d03121ece851d379a1f19893ebab596
https://doi.org/10.1007/978-3-030-92435-5_15
https://doi.org/10.1007/978-3-030-92435-5_15
Publikováno v:
2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT).
Publikováno v:
2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT).
This article describes attacks methods, vectors and technics used by threat actors during pandemic situations in the world. Identifies common targets of threat actors and cyber-attack tactics. The article analyzes cybersecurity challenges and specifi
Publikováno v:
2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT).
this article analyses the usage of software baits as an information security asset. They provided close research about honeypot types, their advantages and disadvantages, possible security breaches, configuration and overall system effectiveness. Oft
Autor:
Vitalii Susukailo, Yuriy Lakh
Publikováno v:
IDAACS-SWS
The subject matter of this paper is to provide information security for an authorized data within the access control systems using encryption technique in QR-code technology. The research goal was investigation of providing secure access control syst