Usage of clustering in decision support system K Khorolska, V Lazorenko, B Bebeshko, A Desiatko, O Kharchenko, ... Intelligent Sustainable Systems: Proceedings of ICISS 2021, 615-629, 2021 | 16 | 2021 |
Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data. H Hnatiienko, NA Kiktev, T Babenko, A Desiatko, L Myrutenko ITS, 169-180, 2021 | 13 | 2021 |
Analysis and modeling of price changes on the exchange market based on structural market data B Bebeshko, K Khorolska, A Desiatko 2021 IEEE 8th International Conference on Problems of Infocommunications …, 2021 | 12 | 2021 |
3D modelling by means of artificial intelligence B Bebeshko, K Khorolska, N Kotenko, A Desiatko, K Sauanova, ... Journal of Theoretical and Applied Information Technology 99 (6), 1296-1308, 2021 | 12 | 2021 |
Methodology for assessing the effectiveness of measures aimed at ensuring information security of the object of informatization V Lakhno, B Akhmetov, A Mazaraki, O Kryvoruchko, V Chubaievskyi, ... Journal of Theoretical and Applied Information Technology 99 (14), 3417-3427, 2021 | 9 | 2021 |
Artificial intelligence face recognition for authentication KN Kryvoruchko O., Bebeshko B., Khorolska K., Desiatko A. ТЕХНІЧНІ НАУКИ ТА ТЕХНОЛОГІЇ, 139-149, 2020 | 8 | 2020 |
Optimization of information and communication transport systems protection tasks S Lakhno, V.a, Tsiutsiura, S.b, Ryndych, Y.c, Blozva, A.d, Desiatko, A.e ... International Journal of Civil Engineering and Technology 1 (Volume 10), 1-9, 2019 | 8* | 2019 |
Application of a Genetic Algorithm for the Selection of the Optimal Composition of Protection Tools of the Information and Educational System of the University BS Akhmetov, V Lakhno, BB Akhmetov, A Zhilkishbayev, N Izbasova, ... Procedia Computer Science 215, 598-607, 2022 | 7 | 2022 |
Models for forming knowledge databases for decision support systems for recognizing cyberattacks V Lakhno, B Akhmetov, M Ydyryshbayeva, B Bebeshko, A Desiatko, ... International Conference on Intelligent Computing & Optimization, 463-475, 2020 | 7 | 2020 |
METHODOLOGY FORMING FOR THE APPROACHES TO THE CYBER SECURITY OF INFORMATION SYSTEMS MANAGEMENT GB ADRANOVA A., YONA L., KRYVORUCHKO O., DESIATKO A., PALAHUTA K., BLOZVA A. Journal of Theoretical and Applied Information Technology, 1993-2005, 2020 | 7 | 2020 |
Smart City Cybersecurity Projects Financing Model in Case of Description of Investors’ Resources With Fuzzy Sets ADTH V. Lakhno, Y. Matus, V. Malyukov International Conference on Advanced Trends in Information Theory (ATIT …, 2019 | 7* | 2019 |
The Model of Server Virtualization System Protection in the Educational Institution Local Network V Lakhno, B Akhmetov, B Yagaliyeva, O Kryvoruchko, A Desiatko, ... Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2023 …, 2023 | 5 | 2023 |
Dual Impact of Crypto Industry Technologies on the Energy Poverty М Чижевська, НІ Романовська, АЮ Рамський, ВВ Венгер, А Десятко CPITS 2023, 293-299, 2023 | 5 | 2023 |
Information security audit method based on the use of a neuro-fuzzy system V Lakhno, B Akhmetov, V Chubaievskyi, A Desiatko, K Palaguta, A Blozva, ... Software Engineering Application in Informatics: Proceedings of 5th …, 2021 | 5 | 2021 |
Development strategy model of the informational management logistic system of a commercial enterprise by neural network apparatus V Lakhno, A Blozva, O Kryvoruchko, A Desiatko, V Semidotska CEUR Workshop Proceedings, 87-98, 2020 | 5 | 2020 |
Model of evaluating smart city projects by groups of investors using a multifactorial approach L Valeriy, M Volodymyr, K Olena, T Mykola, D Alyona, M Tetyana International Conference on Applied Technologies, 13-26, 2019 | 5 | 2019 |
Дослідження основних тенденцій сучасної розробки веб-сайтів N Kotenko, T Zhyrova, V Chybaievskyi, A Desiatko Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка» 1 …, 2019 | 5 | 2019 |
Модель захисту локальної мережі навчального закладу серверної системи віртуалізації V Lakhno, K Yerbolat, Y Bagdat, O Kryvoruchko, A Desiatko, S Tsiutsiura, ... Електронне фахове наукове видання «Кібербезпека: освіта, наука, техніка» 2 …, 2022 | 4 | 2022 |
Indicators systematization of unauthorized access to corporate information V Lakhno, D Kasatkin, A Desiatko, V Chubaievskyi, S Tsuitsuira, ... Intelligent Communication Technologies and Virtual Mobile Networks …, 2022 | 4 | 2022 |
Multi-criterial optimization composition of cyber security circuits based on genetic algorithm V Lakhno, B Akhmetov, H Mohylnyi, A Blozva, V Chubaievskyi, ... Journal of Theoretical and Applied Information Technology 100 (7), 1996-2006, 2022 | 4 | 2022 |