• Home
  • Ievgeniia Kuzminykh
Ievgeniia Kuzminykh

Ievgeniia Kuzminykh

PhD in Telecommunications
Looking for PhD candidates interested to work in detecting of illegal and harmful online content, fake news, dark web.

About

57
Publications
44,385
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
379
Citations
Introduction
Ievgeniia Kuzminykh received her PhD in telecommunications in 2013 from Kharkiv National University of Radio Electronics, Ukraine where she is currently a Visiting Associate Professor. From 2017 to 2020, she was a Senior Lecturer at Blekinge Institute of Technology, Sweden. From 2020 she works at Kings's College London. She has research interests in IoT security and certification, biometric authentication and web security. Her current projects are "Cyfra" and IT Security Summer school.
Additional affiliations
February 2019 - present
Blekinge Institute of Technology
Position
  • Professor (Associate)
September 2017 - January 2019
Blekinge Instirute of Technology, Karlskrona, Sweden
Position
  • PostDoc Position
November 2016 - December 2016
Blekinge Institute of Technology, Karlskrona, Sweden
Position
  • Lecturer

Publications

Publications (57)
Article
As Artificial Intelligence (AI) changes how businesses work, there’s a growing need for people who can work in this sector. This paper investigates how well universities in United Kingdom offering courses in AI, prepare students for jobs in the real world. To gain insight into the differences between university curricula and industry demands we rev...
Preprint
Full-text available
As Artificial Intelligence (AI) changes how businesses work, there's a growing need for people who can work in this sector. This paper investigates how well universities in United Kingdom offering courses in AI, prepare students for jobs in the real world. To gain insight into the differences between university curricula and industry demands we rev...
Preprint
Full-text available
Identity Access Management (IAM) is an area posing significant challenges, particularly in the context of remote connectivity and distributed or cloud-based systems. A wide range of technical solutions have been proposed by prior research, but the integration of these solutions in the commercial sector represent steps that significantly hamper thei...
Article
Full-text available
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing range of cyber security threats targeting IoT-enabled platforms, specifically device firmware vulnerab...
Conference Paper
Modern automotive infotainment systems offer a substantial source of evidence for digital forensic practitioners. However, due to lack of guidance and supporting validation tools, forensic analysts struggle with both data acquisition, analysis and reporting. There are general digital forensic frameworks and legislative acts that can be applied to a...
Article
Full-text available
IP cameras and digital video recorders, as part of the Internet of Surveillance Things (IoST) technology, can sometimes allow unauthenticated access to the video feed or management dashboard. These vulnerabilities may result from weak APIs, misconfigurations, or hidden firmware backdoors. What is particularly concerning is that these vulnerabilitie...
Chapter
Authentication based on keystroke dynamics is a form of behavioral biometric authentication that uses the user typing patterns and keyboard interaction as a discriminatory input. This type of authentication can be coupled with a fixed text password in a traditional login system to contribute to a multifactor authentication or provide continuous use...
Preprint
Full-text available
In: Proceedings of 11th International Black Sea Conference on Communications and Networking (BlackSeaCom'23), 4-7 July, 2023, Istanbul, Turkey... The field of keystroke-based authentication increasingly relies on AI technologies for increased robustness and accuracy. A number of such approaches have been recently proposed, with variable levels of s...
Preprint
Full-text available
In: Proceedings of 11th International Black Sea Conference on Communications and Networking (BlackSeaCom'23), 4-7 July, 2023, Istanbul, Turkey... Quantum computers, although still in the theoretical stage, conceptually have the power to break many current cryptosystems, including public-key schemes, for example, RSA (Rivest, Shamir, Adleman), ellip...
Preprint
Full-text available
The area of cybersecurity risk assessment has been one of significant interest during recent years. A significant amount of research focused on establishing efficient and effective methods to evaluate an organisational IT infrastructure and put in place appropriate security measures to mitigate any potential risks. The information associated with c...
Preprint
Full-text available
An IP camera and digital video recorder as part of the Internet of Surveillance Things (IoST) technology may have a flaw that enables unauthenticated access to the video feed or to the management dashboard via a weak API, misconfiguration or firmware backdoor. This vulnerability might stay in the same condition for weeks, months, or even years befo...
Conference Paper
Full-text available
Cite this as: I. Kuzminykh, S. Mathur, B. Ghita (2023). Performance Analysis of Free Text Keystroke Authentication using XGBoost. In Proceedings of 6th International Conference on Computer Science, Engineering and Education Applications (ICCSEEA2023), March 17–19, 2023,Warsaw, Poland.. Authentication based on keystroke dynamics is a form of behavi...
Article
Full-text available
This article investigates the use of human brainwaves for user authentication. We used data collected from 50 volunteers and leveraged the Support Vector Machine (SVM) as a classification algorithm for the case study. User recognition patterns are taken from a combination of blinking, attention concentration, and picture recognition emotion sequenc...
Article
Full-text available
IoT devices are inherently limited by their processing capabilities and power capacity. While aiming to maximise their lifespan, one of the biggest challenges they face is to reduce the computational burden, especially for tasks such as encryption, data transmission, or compression. This paper investigates the lifespan of an IoT device transmitting...
Chapter
Full-text available
The world wide web, beyond its benefits, has also become a major platform for online criminal activities. Traditional protection methods against malicious URLs, such as blacklisting, remain a valid alternative, but cannot detect unknown sites, hence new methods are being developed for automatic detection, using machine learning approaches. This pap...
Chapter
Full-text available
Many companies consider IoT as a core element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the relationship between the potential impact of IoT security measures and the security challenges when implementing them. This paper presen...
Preprint
Full-text available
The world wide web, beyond its benefits, has also become a major platform for online criminal activities. Traditional protection methods against malicious URLs, such as blacklisting, remain a valid alternative, but cannot detect unknown sites, hence new methods are being developed for automatic detection , using machine learning approaches. This pa...
Article
Full-text available
A study was undertaken to identify the missing skill and expertise of teachers and other stakeholders in the field of EU cyber security regulatory documents and frameworks. In order to increase the knowledge in this area and promote the EU security frameworks the model for the continuous building of teacher competence has been proposed and planned...
Conference Paper
Full-text available
One of the main challenges encountered in the learning process is determining the content and concepts that present challenges for students, defined by the literature as troublesome knowledge. This paper focuses on exploring the potential threshold concept in the context of cyber security programmes delivered in higher education institutions. The a...
Preprint
Full-text available
Modern streaming services are increasingly labeling videos based on their visual or audio content. This typically augments the use of technologies such as AI and ML by allowing to use natural speech for searching by keywords and video descriptions. Prior research has successfully provided a number of solutions for speech to text, in the case of a h...
Article
Full-text available
Information security risk assessment is an important part of enterprises' management practices that helps to identify, quantify, and prioritize risks against criteria for risk acceptance and objectives relevant to the organization. Risk management refers to a process that consists of identification , management, and elimination or reduction of the...
Preprint
Full-text available
This paper investigates the lifespan of an IoT device transmitting en-crypted data as a function of the encryption algorithm used and the packet length. We focus the analysis particularly on lightweight algorithms popular in IoT ecosystems , such as AES, XTEA, HIGHT, KLEIN, ECC, PRESENT, Serpent, Piccolo, Blowfish, and Twofish. The results of the s...
Preprint
Full-text available
How to cite this paper: I. Kuzminykh, M. Yevdokymenko, O. Yeremenko, O. Lemeshko, " Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks", International Journal of Modern Education and Computer Science(IJMECS), Vol.13, No.6, pp. 60-68, 2021.
Conference Paper
Full-text available
The paper investigates the impact of network traffic and network characteristics on the effectiveness of keystroke dynamics for continuous and one-time authentication in the remote desktop applications and virtual desktop infrastructure. The context presented in the paper contributes to the area of biometric authentication systems by identifying vi...
Article
Full-text available
The paper investigates the impact of network traffic and network characteristics on the effectiveness of keystroke dynamics for continuous and one-time authentication in the remote desktop applications and virtual desktop infrastructure. The context presented in the paper contributes to the area of biometric authentication systems by identifying vi...
Article
Full-text available
Образование будущих специалистов по кибербезопасности должна включать и дополнять современный теоретическое содержание соответствующих курсов необходимыми практическими навыками. В области образования в кибербезопасности предполагается, что преподаватели и практические / лабораторные работы под их руководством должны мотивировать студентов к выполн...
Chapter
Managing cryptographic keys can be a complex task for an enterprise and particularly difficult to scale when an increasing number of users and applications need to be managed. In order to address scalability issues, typical IT infrastructures employ key management systems that are able to handle a large number of encryption keys and associate them...
Chapter
Full-text available
In this study, we specifically focus on the YamNet, AlexNet, and ResNet-50 pre-trained models to automatically classify audio samples using their respective melspectrograms into a number of predefined classes. The predefined classes can represent sounds associated with actions within a video fragment. Two tests are conducted to eval-uate the perfor...
Article
Full-text available
Over the last decade, the area of electroencephalography (EEG) witnessed a progressive move from high-end large measurement devices, relying on accurate construction and providing high sensitivity, to miniature hardware, more specifically wireless wearable EEG devices. While accurate, traditional EEG systems need a complex structure and long period...
Preprint
Full-text available
Many companies consider IoT as a central element for increasing competitiveness. Despite the growing number of cyberattacks on IoT devices and the importance of IoT security, no study has yet primarily focused on the impact of IoT security measures on the security challenges. This paper presents a review of the current state of security of IoT in c...
Preprint
Full-text available
Authentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, can be used in remote display access to guarantee the security of use of remote connectivity systems during the access control...
Article
Currently, in conditions of distance learning of students, the problem of the organization of practical and laboratory works acquires special importance. This mainly applies to technical universities, where training in normal conditions is carried out on real equipment and using specialized software. As a result, there is an urgent need to create v...
Article
Full-text available
User authentication is one of the most important aspects in the area of cloud services, followed by the storing of sensitive information about customers. A number of solutions exist for authentication, security, and privacy provisioning in cloud, while cloud identity management systems aim to simplify and harmonise access. This paper presents an in...
Preprint
Full-text available
In this paper, a home automation system model was constructed with purpose to investigate of the correlation between the performance of wireless communication, power consumption of the constrained IoT devices and security. The series of experiments were conducted using sensor nodes connected to Arduino microcontroller and an RF 433 MHz wireless com...
Article
Full-text available
В настоящей работе рассмотрено функционирование широко известного протокола сигнализации SIP для сетей IP-телефонии на уровне транзакций. Построена модель обмена сообщениями в протоколе инициирования сеансов связи SIP между клиентской и серверной сторонами в форме раскрашенных сетей Петри. Для верификации корректности работы модели использованы инв...
Chapter
Full-text available
This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during...
Chapter
Full-text available
To meet the high demand of educating the next generation of MSc students in Cyber security, we propose a well-composed curriculum and a configurable cloud based learning support environment ReSeLa. The proposed system is a result of the EU TEMPUS project ENGENSEC and has been extensively validated and tested.
Chapter
Full-text available
This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such applic...
Chapter
Full-text available
Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer fro...
Conference Paper
Full-text available
Initial topology construction is the first phase of wireless sensor network deployment. The main purpose of algorithms of this phase is to reduce the topology of the network and save connectivity. Reducing topology gives an advantage in energy consumption. Although there are many ways to accomplish such tasks each protocol in this category measures...
Conference Paper
Full-text available
The paper introduces a new scheme of dynamic interference free channel allocation. The scheme is based on additional spectral analyzers in wireless networks IEEE 802.11. Design and implementation is presented.
Conference Paper
Full-text available
In the rapidly growing Internet of Things (loT) applications from personal electronics to industrial machines and sensors are getting wirelessly connected to the Internet. Many well-known communication technologies such as WiFi, ZigBee, Bluetooth and cellular are used for transfer data in IoT. The choice of corresponding technology or combination o...
Conference Paper
Full-text available
This paper represents the smart system that bypasses the normal functioning algorithm of traffic lights, triggers a green light when the lights are red or to reset the timer of the traffic lights when they are about to turn red. Different pieces of hardware like microcontroller units, transceivers, resistors, diode, LEDs, digital compass and accele...
Article
Full-text available
The Petri model of call setup and disconnect in SIP network is worked out. This model allows to evaluate the timed and probability characteristics of signaling traffic and the dynamics of server buffer utilization ОЦЕНКА ПАРАМЕТРОВ SIP-СЕТИ С ИСПОЛЬЗОВАНИЕМ РАСКРАШЕННЫХ СEТЕЙ ПЕТРИ. Разработана модель Петри сценария установления соединения в сетях...
Article
Full-text available
In this paper a simulation model of message service procedure in SIP server in the normal conditions and in the congestion state is represented. The paper proposes local overload control for SIP server applied FIFO discipline in normal state and LIFO discipline with priority service model during overload.
Article
Full-text available
Предложен метод борьбы с перегрузкой на SIP-сервере, в котором обслуживание вызовов осуществляется по схеме с динамическим приоритетом и дисциплиной обслуживания LIFO в режиме перегрузки с учетом текущей фазы установления соединения. Этот метод позволяет повысить эффективность работы SIP-серверов в режиме высокой нагрузки.
Article
In this paper how to apply some of the existing failover and load sharing techniques to SIP servers are considered and an identifier-based two-stage load sharing method is proposed. DNS, server redundancy and the identifier -based load sharing were combine in two-stage reliable and scalable server architecture. It is performanced an evaluation of t...

Questions

Questions (2)
Question
Recently MDPI has launched a new journal Encyclopedia where the type of article is "Entry".
From the mdpi web-site:
Entry "is a description of mature knowledge from researchers for reference, of which the structure contains definition and explanation. Its content is generally composed of the definition of a research object, and facts (history, discoveries, applications, etc.)"
The definition is not clear but the entry seems to be NOT a reasearch paper but something fundamental that we usually put into the background section.
What do you think should be in this type of paper?
Question
Does anybody know existing standards in the security assessment for IOT devices/products, except NIST? Or suggest me what security assessment standards/frameworks can be used as basis and adopted to the IoT systems?

Network

Cited By