АНАЛИЗ МЕТОДОВ БАЛАНСИРОВКИ НАГРУЗКИ В КЛАСТЕРЕ SIP-СЕРВЕРОВ ЕД Кузьминых «Проблемы телекоммуникаций», 67-75, 2014 | 2 | 2014 |
МЕТОД БОРЬБЫ С ПЕРЕГРУЗКОЙ НА SIP-СЕРВЕРЕ С УЧЕТОМ ДИНАМИЧЕСКОГО ПРИОРИТЕТА И ТЕКУЩЕЙ ФАЗЫ УСТАНОВЛЕНИЯ СОЕДИНЕНИЯ ЕД КУЗЬМИНЫХ «Проблемы телекоммуникаций», режим доступа http://pt.journal.kh.ua/2012/2/1 …, 2012 | | 2012 |
Методи обслуговування викликів на SIP-серверах в умовах великого навантаження ЄД Кузьміних | | 2013 |
Особливості створення віртуальної лабораторії кібербезпеки для дистанційного навчання О Lemeshko, О Yeremenko, М Yevdokymenko, I Kuzminykh New Collegium 3 (101), 41-45, 2020 | 5 | 2020 |
Оценка параметров SIP-сети с использованием раскрашенных сетей Петри ЕД Кузьминых Проблеми телекомунікацій, 2012 | 3 | 2012 |
Спосіб боротьби з перевантаженням на сервері SIP ЄД Кузьміних, ДВ Агеєв ХНУРЕ, 2013 | | 2013 |
A combined LIFO-Priority algorithm for overload control of SIP server I Kuzminykh Proceedings of International Conference on Modern Problem of Radio …, 2012 | 4 | 2012 |
A Performance Evaluation of Sensor Nodes in the Home Automation System based on Arduino I Kuzminykh, A Carlsson, M Yevdokymenko The 6th International Scientific-Practical Conference “Problems of …, 2019 | 5 | 2019 |
A Review of IoT Firmware Vulnerabilities and Auditing Techniques T Bakhshi, B Ghita, I Kuzminykh Sensors 24 (2), 708, 2024 | 4 | 2024 |
Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture I Kuzminykh, A Carlsson Internet of Things, Smart Spaces, and Next Generation Networks and Systems 1 …, 2018 | 17 | 2018 |
Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats I Kuzminykh, M Yevdokymenko, D Ageyev 2020 IEEE International Conference on Problems of Infocommunications …, 2020 | 12 | 2020 |
Analysis of methods for reducing topology in wireless sensor networks O Popov, I Kuzminykh 2018 14th International Conference on Advanced Trends in Radioelecrtronics …, 2018 | 4 | 2018 |
Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses H Xiao, J Spring, I Kuzminykh 2nd International Workshop on CyberSecurity Education for Industry and …, 2024 | | 2024 |
Audio Interval Retrieval Using Convolutional Neural Networks I Kuzminykh, D Shevchuk, S Shiaeles, B Ghita Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2020 | 11 | 2020 |
Avatar conception for “Thing” representation in Internet of Things I Kuzminykh Proceedings of the 14th Swedish National Computer Networking Workshop …, 2018 | 5 | 2018 |
Brainwave-based authentication using features fusion M TajDini, V Sokolov, I Kuzminykh, B Ghita Computers & Security 129, 103198, 2023 | 7 | 2023 |
Comparative analysis of cryptographic key management systems I Kuzminykh, B Ghita, S Shiaeles International Conference on Next Generation Wired/Wireless Networking, 80-94, 2020 | 11 | 2020 |
Cyber Resilience and Fault Tolerance of Artificial Intelligence Systems: EU Standards, Guidelines, and Reports O Lemeshko, M Yevdokymenko, O Yeremenko, I Kuzminykh Workshop on Cybersecurity Providing in Information and Telecommunication …, 2020 | 4 | 2020 |
Cybersecurity Virtual Laboratory for distance learning O Yeremenko, M Yevdokymenko, I Kuzminykh, A Kruhlova womENcourage 2020, 24-27 September 2020, 2020 | 3 | 2020 |
Data Driven Approaches to Cybersecurity Governance for Board Decision-Making--A Systematic Review A Modi, I Kuzminykh, B Ghita arXiv preprint arXiv:2311.17578, 2023 | | 2023 |