Oleksandr Glebovish Oksiiuk

Oleksandr Glebovish Oksiiuk
National Taras Shevchenko University of Kyiv | Київський національний університет імені Тараса Шевченка · Department of Cybersecurity and Information Protection

Head of the Department of the Cybersecurity and Data Protection, Taras Shevchenko National University of Kyiv

About

17
Publications
352
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
46
Citations
Citations since 2017
17 Research Items
46 Citations
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015

Publications

Publications (17)
Chapter
The use of data mining technologies, including neural networks, has become widespread in cybersecurity. Outdated approaches for analyzing and identifying rule- or template-based attacks do not always produce the desired result. Successful implementation of a cyber-attack can lead not only to disruption of the information system, but also to potenti...
Article
Open and free cyberspace increases the freedom of people and social communications, in such conditions it becomes especially important to search for new possibilities of ensuring the state security in view of the formation of a new confrontation field - cyberspace. It is important to analyze the actual problems of information security, actions of t...
Article
Full-text available
The determining factor for success during modern warfare is the struggle for supremacy in the air. The main task for a defending side is to prevent the enemy's superiority in the air. Various means of destruction are used for this purpose. A criterion to avoid enemy's superiority in the air is considered to be the assigned balance of aviation by pa...
Article
Full-text available
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc...
Article
The article highlighted the advantage of information systems in front of centralized systems in terms of ensuring the security of network infrastructure, data transmitted, and procedures used in the software environment of the complex. It was pointed out the technical simplicity of the methods of expansion of information systems and, accordingly, t...

Network

Cited By