Statistical techniques for detecting cyberattacks on computer networks based on an analysis of abnormal traffic behavior Z Hu, R Odarchenko, S Gnatyuk, M Zaliskyi, A Chaplits, S Bondar, ... International Journal of Computer Network and Information Security 12 (6), 1, 2020 | 85 | 2020 |
High-speed and secure PRNG for cryptographic applications Z Hu, S Gnatyuk, T Okhrimenko, S Tynymbayev, M Iavich International Journal of Computer Network and Information Security 12 (3), 1-10, 2020 | 75 | 2020 |
Critical aviation information systems cybersecurity E Shahbazian, G Rogova Meeting security challenges through data analytics and decision support 47, 308, 2016 | 74 | 2016 |
Modern quantum technologies of information security against cyber‐terrorist attacks O Korchenko, Y Vasiliu, S Gnatyuk Aviation 14 (2), 58-69, 2010 | 71 | 2010 |
Кібертероризм: історія розвитку, сучасні тенденції та контрзаходи С Гнатюк Безпека інформації, 118-129, 2013 | 61 | 2013 |
Security key indicators assessment for modern cellular networks R Odarchenko, V Gnatyuk, S Gnatyuk, A Abakumova 2018 IEEE First International Conference on System Analysis & Intelligent …, 2018 | 46 | 2018 |
Secure hash function constructing for future communication systems and networks S Gnatyuk, V Kinzeryavyy, K Kyrychenko, K Yubuzova, M Aleksander, ... Advances in Artificial Systems for Medicine and Education II 2, 561-569, 2020 | 45 | 2020 |
Anomaly detection system in secure cloud computing environment Z Hu, S Gnatyuk, O Koval, V Gnatyuk, S Bondarovets International Journal of Computer Network and Information Security 9 (4), 10, 2017 | 45 | 2017 |
Detection of distributed denial of service attacks using snort rules in cloud computing & remote control systems Z Hassan, R Odarchenko, S Gnatyuk, A Zaman, M Shah 2018 IEEE 5th International Conference on Methods and Systems of Navigation …, 2018 | 43 | 2018 |
Network Society: Aggregate Topological Models A Tikhomirov, A Afanasyev, N Kinash, A Trufanov, OG Berestneva, ... Springer Verlag, 2014 | 43 | 2014 |
Сучасні квантові технології захисту інформації ОГ Корченко, ЄВ Васіліу, СО Гнатюк Науково-технічний журнал" Захист інформації", 2009 | 41 | 2009 |
Efficiency increasing method for quantum secure direct communication protocols S Gnatyuk, T Zhmurko, P Falat 2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015 | 40 | 2015 |
Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks. M Zalisky, R Odarchenko, S Gnatyuk, Y Petrova, A Chaplits IDDM, 193-204, 2018 | 39 | 2018 |
Analysis of self-similar traffic models in computer networks JS Al-Azzeh, M Al Hadidi, R Odarchenko, S Gnatyuk, Z Shevchuk, Z Hu International Review on Modelling and Simulations 10 (5), 328-336, 2017 | 39 | 2017 |
The device for multiplying polynomials modulo an irreducible polynomial M Kalimoldayev, S Tynymbayev, S Gnatyuk, M Ibraimov, M Magzom News of the National Academy of Sciences of the Republic of Kazakhstan …, 2019 | 38 | 2019 |
New secure block cipher for critical applications: design, implementation, speed and security analysis S Gnatyuk, B Akhmetov, V Kozlovskyi, V Kinzeryavyy, M Aleksander, ... Advances in artificial systems for medicine and education III, 93-104, 2020 | 37 | 2020 |
Synergistic effects of information and cybernetic interaction in civil aviation Y Danik, R Hryschuk, S Gnatyuk Aviation 20 (3), 137-144, 2016 | 36 | 2016 |
Unified data model for defining state critical information infrastructure in civil aviation S Gnatyuk, M Aleksander, V Sydorenko 2018 IEEE 9th International Conference on Dependable Systems, Services and …, 2018 | 33 | 2018 |
Method of searching birationally equivalent Edwards curves over binary fields Z Hu, S Gnatyuk, M Kovtun, N Seilova Advances in Computer Science for Engineering and Education 13, 309-319, 2019 | 32 | 2019 |
Кібернетична безпека держави: характерні ознаки та проблемні аспекти ОГ Корченко, ВЛ Бурячок, СО Гнатюк Науковий журнал" Безпека інформації", 2013 | 32 | 2013 |