Volgen
Artem Tetskyi
Artem Tetskyi
Associate Professor of Dept. of Computer Systems, Networks and Cybersecurity
Geverifieerd e-mailadres voor khai.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks
O Morozova, A Nicheporuk, A Tetskyi, V Tkachov
Radioelectronic and computer systems, 145-156, 2021
222021
Neural networks based choice of tools for penetration testing of web applications
A Tetskyi, V Kharchenko, D Uzun
2018 IEEE 9th International Conference on Dependable Systems, Services and …, 2018
202018
Architecture and Model of Neural Network Based Service for Choice of the Penetration Testing Tools
A Tetskyi, V Kharchenko, D Uzun, A Nechausov
International Journal of Computing 20 (4), 513-518, 2021
62021
Method to Determine Fault-Tolerant Performance Probability of High-Survivability Computer Network based on Mobile Platform
V Tkachov, M Hunko, O Morozova, A Tetskyi, A Nicheporuk
2021 IEEE 8th International Conference on Problems of Infocommunications …, 2021
62021
CYBERSECURITY ASPECTS OF E-LEARNING PLATFORMS
АГ Тецький, ОІ Морозова
RADIOELECTRONIC AND COMPUTER SYSTEMS, 93-97, 2020
62020
Modeling and Availability Assessment of Mobile Healthcare IoT Using Tree Analysis and Queueing Theory
A Strielkina, D Uzun, V Kharchenko, A Tetskyi
Dependable IoT for Human and Industry: Modeling, Architecting …, 2018
6*2018
Analysis of the Possibilities of Unauthorized Access in Content Management Systems Using Attack Trees
A Tetskyi, V Kharchenko, D Uzun
Proc. PhD Symposium at ICTERI 2018, 14-17, 0
5*
THE METHOD OF SELECTING MEASURES TO PROTECT THE WEB APPLICATION AGAINST ATTACKS
A Tetskyi
Харківський політехнічний інститут” National Technical University “Kharkiv …, 2018
32018
Исследование методов получения содержимого базы данных с помощью SQL-инъекций
АГ Тецкий
Открытые информационные и компьютерные интегрированные технологии, 188-191, 2014
22014
Selecting Cloud Service for Healthcare Applications: From Hardware to Cloud Across Machine Learning
I Kuzlo, A Strielkina, A Tetskyi, D Uzun
2*
Applying of attack trees for estimation the probability of a successful attack of the web-application
АГ Тецкий
RADIOELECTRONIC AND COMPUTER SYSTEMS, 74-79, 2018
12018
Исследование структуры системы управления образовательным контентом MOODLE с использованием элементов реверс-инжиниринга
АГ Тецкий, ДД Узун
Открытые информационные и компьютерные интегрированные технологии, 206-210, 2014
12014
Smart home system security risk assessment
O Morozova, A Tetskyi, A Nicheporuk, D Kruvak, V Tkachov
Хмельницький національний університет, 2021
2021
АНАЛІЗ ПРОБЛЕМ І МОЖЛИВОСТЕЙ ЗАБЕЗПЕЧЕННЯ БЕЗПЕКИ WEB-ЗАСТОСУНКІВ, СТВОРЕНИХ ЗА ДОПОМОГОЮ СИСТЕМ КЕРУВАННЯ ВМІСТОМ
A Tetskyi
Системи управління, навігації та зв’язку. Збірник наукових праць 1 (53), 133-136, 2019
2019
APPLYING OF NEURAL NETWORKS FOR SELECTING THE TOOLS FOR PENETRATION TESTING OF WEB APPLICATIONS
АГ Тецкий
RADIOELECTRONIC AND COMPUTER SYSTEMS, 86-90, 2018
2018
DEPENDABLE IOT FOR HUMAN AND INDUSTRY: MODELING, ARCHITECTING, IMPLEMENTATION
A Strielkina, D Uzun, V Kharchenko, A Tetskyi, AKA Waleed, O Illiashenko, ...
Prospects 479, 502, 2018
2018
SECURE AND RESILIENT COMPUTING FOR INDUSTRY AND HUMAN DOMAINS. Techniques, tools and assurance cases for security and resilient computing
A Gordieiev, V Kharchenko, V Sklyar, A Perepelitsyn, V Kulanov, ...
2017
Исследование атаки на проникновение на систему управления контентом с помощью марковской модели
АГ Тецкий, ДД Узун
Радіоелектронні і комп’ютерні системи, 46–49-46–49, 2016
2016
Development of the universal data transfer protocol: mobile solution.
A Krepchenko, A Strielkina, A Tetskyi, D Uzun
DESSERT’2018 Committees
O Golembovska, O Hahina, M Medinskaya, A Strielkina, A Tetskyi
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20