关注
Ievgeniia Kuzminykh
Ievgeniia Kuzminykh
King's College London, Department of Informatics
在 nure.ua 的电子邮件经过验证
标题
引用次数
年份
АНАЛИЗ МЕТОДОВ БАЛАНСИРОВКИ НАГРУЗКИ В КЛАСТЕРЕ SIP-СЕРВЕРОВ
ЕД Кузьминых
«Проблемы телекоммуникаций», 67-75, 2014
22014
МЕТОД БОРЬБЫ С ПЕРЕГРУЗКОЙ НА SIP-СЕРВЕРЕ С УЧЕТОМ ДИНАМИЧЕСКОГО ПРИОРИТЕТА И ТЕКУЩЕЙ ФАЗЫ УСТАНОВЛЕНИЯ СОЕДИНЕНИЯ
ЕД КУЗЬМИНЫХ
«Проблемы телекоммуникаций», режим доступа http://pt.journal.kh.ua/2012/2/1 …, 2012
2012
Методи обслуговування викликів на SIP-серверах в умовах великого навантаження
ЄД Кузьміних
2013
Особливості створення віртуальної лабораторії кібербезпеки для дистанційного навчання
О Lemeshko, О Yeremenko, М Yevdokymenko, I Kuzminykh
New Collegium 3 (101), 41-45, 2020
52020
Оценка параметров SIP-сети с использованием раскрашенных сетей Петри
ЕД Кузьминых
Проблеми телекомунікацій, 2012
32012
Спосіб боротьби з перевантаженням на сервері SIP
ЄД Кузьміних, ДВ Агеєв
ХНУРЕ, 2013
2013
A combined LIFO-Priority algorithm for overload control of SIP server
I Kuzminykh
Proceedings of International Conference on Modern Problem of Radio …, 2012
42012
A Performance Evaluation of Sensor Nodes in the Home Automation System based on Arduino
I Kuzminykh, A Carlsson, M Yevdokymenko
The 6th International Scientific-Practical Conference “Problems of …, 2019
52019
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
T Bakhshi, B Ghita, I Kuzminykh
Sensors 24 (2), 708, 2024
42024
Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
I Kuzminykh, A Carlsson
Internet of Things, Smart Spaces, and Next Generation Networks and Systems 1 …, 2018
172018
Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats
I Kuzminykh, M Yevdokymenko, D Ageyev
2020 IEEE International Conference on Problems of Infocommunications …, 2020
122020
Analysis of methods for reducing topology in wireless sensor networks
O Popov, I Kuzminykh
2018 14th International Conference on Advanced Trends in Radioelecrtronics …, 2018
42018
Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses
H Xiao, J Spring, I Kuzminykh
2nd International Workshop on CyberSecurity Education for Industry and …, 2024
2024
Audio Interval Retrieval Using Convolutional Neural Networks
I Kuzminykh, D Shevchuk, S Shiaeles, B Ghita
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2020
112020
Avatar conception for “Thing” representation in Internet of Things
I Kuzminykh
Proceedings of the 14th Swedish National Computer Networking Workshop …, 2018
52018
Brainwave-based authentication using features fusion
M TajDini, V Sokolov, I Kuzminykh, B Ghita
Computers & Security 129, 103198, 2023
72023
Comparative analysis of cryptographic key management systems
I Kuzminykh, B Ghita, S Shiaeles
International Conference on Next Generation Wired/Wireless Networking, 80-94, 2020
112020
Cyber Resilience and Fault Tolerance of Artificial Intelligence Systems: EU Standards, Guidelines, and Reports
O Lemeshko, M Yevdokymenko, O Yeremenko, I Kuzminykh
Workshop on Cybersecurity Providing in Information and Telecommunication …, 2020
42020
Cybersecurity Virtual Laboratory for distance learning
O Yeremenko, M Yevdokymenko, I Kuzminykh, A Kruhlova
womENcourage 2020, 24-27 September 2020, 2020
32020
Data Driven Approaches to Cybersecurity Governance for Board Decision-Making--A Systematic Review
A Modi, I Kuzminykh, B Ghita
arXiv preprint arXiv:2311.17578, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20