default search action
Viktoriia Sydorenko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Volodymyr Sokolov:
Method for managing IT incidents in critical information infrastructure facilities (short paper). CPITS II 2024: 326-333 - [c19]Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Andrii Paziuk, Artem Polozhentsev:
Experimental study of the model for calculating the quantitative criteria for assessing the security level of information and communication systems of the state critical infrastructure (short paper). CSDP 2024: 81-89 - 2023
- [c18]Stanislav Yarotskiy, Viktoriia Sydorenko, Anzhela Lelechenko, Olena Kolisnyk, Artem Polozhentsev:
Method of Determining the Importance Factor of IT Security Projects Investment Attractiveness in Critical Infrastructures. CPITS II 2023: 181-190 - [c17]Sergiy Gnatyuk, Feruza Satybaldiyeva, Viktoriia Sydorenko, Oksana Zhyharevych, Artem Polozhentsev:
Model of Information Technology for Efficient Data Processing in Cloud-based Malware Detection Systems of Critical Information Infrastructure (short paper). CPITS 2023: 206-213 - [c16]Maksym Lutskyi, Viktoriia Sydorenko, Artem Polozhentsev, Nataliia Apenko, Serhii Sydorenko:
Model for Assessing the Effectiveness of Information Security Systems of Interdependent Critical Infrastructures (short paper). CPITS 2023: 214-222 - [c15]Maksym Lutskyi, Sergiy Gnatyuk, Viktoriia Sydorenko, Stanislav Yarotskiy, Artem Polozhentsev:
Study on the Evaluating the Degree of Investment Attractiveness of It-Projects. DESSERT 2023: 1-7 - [c14]Artem Polozhentsev, Sergiy Gnatyuk, Rat Berdibayev, Viktoriia Sydorenko, Oksana Zhyharevych:
Novel Cyber Incident Management System for 5G-based Critical Infrastructures. IDAACS 2023: 1037-1041 - 2022
- [c13]Oleksii Smirnov, Viktoriia Sydorenko, Marek Aleksander, Oksana Zhyharevych, Serhii Yenchev:
Simulation of the cloud IoT-based monitoring system for critical infrastructures. CMiGIN 2022: 256-265 - [c12]Sergiy Gnatyuk, Rat Berdibayev, Viktoriia Sydorenko, Artem Polozhentsev, Myroslav Ryabyy:
Enterprise Service Bus Construction in SOA Architecture for SIEM Implementation in Critical Information Infrastructure. CPITS 2022: 11-20 - [c11]Sergiy Gnatyuk, Oleksiy Yudin, Viktoriia Sydorenko, Tetiana Smirnova, Artem Polozhentsev:
The Model for Calculating the Quantitative Criteria for Assessing the Security Level of Information and Telecommunication Systems. IntelITSIS 2022: 390-399 - [c10]Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Oksana Zhyharevych, Artem Polozhentsev:
Method for Calculating the Criticality Level of Sectoral Information and Telecommunication Systems. IT&I 2022: 234-245 - [c9]Andriy Semenchenko, Volodymyr Gurkovskyi, Yevhen Romanenko, Viktoriia Sydorenko, Stanislava Kudrenko, Artem Polozhentsev:
Ukraine on the Road to the European Digital Market: Status and Tools for Implementing the European Digital Economy and Society Index in Ukraine. SCIA 2022: 18-28 - 2021
- [c8]Sergiy Gnatyuk, Oleksiy Yudin, Viktoriia Sydorenko, Artem Polozhentsev, Rashit Brzhanov:
Method of Forming the Functional Security Profile for the Sectoral Information and Telecommunication Systems. IT&I Workshops 2021: 272-283 - 2020
- [c7]Sergiy Gnatyuk, Viktoriia Sydorenko, Oleh Polihenko, Yuliia Sotnichenko, Olena Nechyporuk:
Studies on the Disasters Criticality Assessment in Aviation Information Infrastructure. CITRisk 2020: 282-296 - [c6]Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Andriy Fesenko, Nurbol Akatayev, Gulnaz Zhilkishbayeva:
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State. COAPSN 2020: 332-341 - [c5]Viktoriia Sydorenko, Sergiy Gnatyuk, Andriy Fesenko, Yaroslav Yevchenko, Andrii Tolbatov, Yuliia Sotnichenko:
Experimental FMECA-based Assessing of the Critical Information Infrastructure Importance in Aviation. ICTERI Workshops 2020: 136-156
2010 – 2019
- 2019
- [c4]Sergiy Gnatyuk, Jamilya Akhmetova, Viktoriia Sydorenko, Yuliia Polishchuk, Valentyn Petryk:
Quantitative Evaluation Method for Mass Media Manipulative Influence on Public Opinion. COLINS 2019: 71-83 - [c3]Sergiy Gnatyuk, Viktoriia Sydorenko, Iuliia Goncharenko, Yuliia Sotnichenko, Nurgul A. Seilova, Dinara Basshykyzy:
Experimental Identification of the Critical Information Infrastructure Objects in Aviation. CybHyg 2019: 798-809 - [c2]Maksat Kalimoldayev, Sahibay Tynymbayev, Miras Magzom, Margulan Ibraimov, Serik Khokhlov, Akmaral Abisheva, Viktoriia Sydorenko:
Polynomials Multiplier under Irreducible Polynomial Module for High-Performance Cryptographic Hardware Tools. ICTERI Workshops 2019: 729-737 - [c1]Zhengbing Hu, Yevhen Vasiliu, Oleksii Smirnov, Viktoriia Sydorenko, Yuliia Polishchuk:
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems. IDAACS 2019: 399-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 01:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint