Конференції
- Serhii Yevseiev, Stanislav Milevskyi, Marharyta Melnyk, Ivan Opirskyy, Marta Stakhiv, Roman Stakhiv Entropy Method for Assessing the Strength of Encryption Algorithms. May 2024. Conference: 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA).
- S. Pohasii, R. Korolov, N. Dzheniuk, A. Jammine, T. Andriushchenko and T. Milevska, “Decision Making in Managing the Choice of UAV Threat Detection Systems in the Protection of Critical Infrastructure Facilities,” 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Istanbul, Turkiye, 2023, pp. 1-6, doi: 10.1109/HORA58378.2023.10155776.
- S. Herasimov, A. Tkachov, V. Soroka, S. Yevseiev, T. Milevska and S. Dunaiev, “Method for Assessing Meter Error Characteristics of Random Signals,” 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2023, pp. 1-5, doi: 10.1109/ISMSIT58785.2023.10304988.
- S. Yevseiev, P. Murr, S. Milevskyi, O. Korol and M. Melnyk, “Development of a Sociocyberphysical Systems Cyber Threats Classifier,” 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2023, pp. 1-7, doi: 10.1109/ISMSIT58785.2023.10304895.
- Y. Sokol, O. Trush, S. Yevseiev and O. Milov, “Implementation of Information and Communication Technologies in the Educational Process,” 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Istanbul, Turkiye, 2023, pp. 1-8, doi: 10.1109/HORA58378.2023.10156664.
- S. Herasimov, V. Soroka, S. Yevseiev, S. Milevskyi and K. Bondarenko, “Development of a Method for Measuring small Nonlinear Distortions of Periodic Electrical Signals,” 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 2022, pp. 49-52, doi: 10.1109/ISMSIT56059.2022.9932685.
- H. M. Jawad, M. J. Abu-AlShaeer, S. Yevseiev, V. Kornienko and O. Turovsky, “Improvement of the Methodology of Building a System of Phase Synchronization of Coherent Demodulators in Telecommunication Control Systems and Distance Learning,” 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkey, 2022, pp. 1013-1016, doi: 10.1109/ISMSIT56059.2022.9932844.
- S. Herasymov, V. Olenchenko, S. Yevseiev, S. Milevskyi and S. Pohasii, “Investigation of the Dynamic Filters’ Characteristics for the Analysis of Random Signals During Data Transmission,” 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, 2022, pp. 1-6, doi: 10.1109/KhPIWeek57572.2022.9916327.
- Oleksandr Milov, Serhii Yevseiev, Nataliia Zviertseva, Herman Zviertsev, Yevhen Motalyhin. Pseudo-Physical Logics in Control of Cyber Security Systems. Conference: 2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).
- Roman Korolov; Stanislav Milevskyi; Elnur Baghirov; Musa Mammadov. Research of Periodic Properties of the Generator Based on m-ary Codes. Conference: 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek).
- Oleksandr Milov, Vladyslav Khvostenko, Voropay Natalia, Olha Korol, Nataliia Zviertseva. Situational control of cyber security in socio-cyber-physical systems. Conference: 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
- Sergiy Tymchenko, Volodymyr Kutsenko, Serhii Yevseiev, Stanislav Milevskyi, Serhii Pohasii. Measuring Signals Synthesis Method on the Basis of Triangular Time-Pulse Modulation for Control of Radiotechnic Systems Technical Condition. Concept. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. June 9-11, 2022, Ankara, Turkey
- Serhii Yevseiev; Oleg Trakaliuk; Maksym Kuzmenko; Tetiana Laptieva; Serhii Laptiev; Igor Polovinkin. An Improved Method of Detection and Localization of Signals in the Digital Range. 2022 IEEE 4th International Conference on Advanced Trends in Information Theory. (ATIT), 15-17 December 2022, Kyiv, Ukraine, 2022.DOI: 10.1109/ATIT58178.2022.10024242.
- Serhii Yevseiev, Stanislav Milevskyi, Leonid Bortnik, Voropay Alexey, Kyrylo Bondarenko, Serhii Pohasii. Socio-Cyber-Physical Systems Security Concept. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. June 9-11, 2022, Ankara, Turkey
- Oleksandr Laptiev, Serhii Yevseiev, Andrii Trystan, Valerii Chystov, Olha Matiushchenko and Iryna Zakharchenko. Solving the Problem of Convergence of the Results of Analog Signals Conversion in the Process of Aircraft Control. 2022 IEEE Third International Conference on SYSTEM ANALYSIS & INTELLIGENT COMPUTING (SAIC), 04-07 Oktober, Kyiv, Ukraine. p. 118-124.
- S. Herasymov, V. Olenchenko, S. Yevseiev, S. Milevskyi and S. Pohasii, “Investigation of the Dynamic Filters’ Characteristics for the Analysis of Random Signals During Data Transmission,” 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, 2022, pp. 1-6, doi: 10.1109/KhPIWeek57572.2022.9916327.
- A. Havrylova, A. Tkachov and R. I. R. Qizi, “Estimating the Efficiency of Using the Modified UMAC Algorithm,” 2022 IEEE 3rd KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, 2022, pp. 1-5, doi: 10.1109/KhPIWeek57572.2022.9916425.
- Yevseiev S. Evaluation of Cryptographic Strength and Energy Intensity of Design of Modified Crypto-Code Structure of McEliece with Modified Elliptic Codes / S. Yevseiev, O. Korol, O. Veselska, S. Pohasii, V. Khvostenko // Міжнар. наук.-практ. конф. «Інформаційна безпека та інформаційні технології», Харків – Одеса, 13-19 вер. 2021 р. : матер. конф. – Харків : ХНЕУ ім. С. Кузнеця, 2021. – С. 144-157.
- O. Laptiev, V. Savchenko, H. Haidur, S. Gakhov, S. Hohoniants, S. Yevseiev. The new method for detecting signals of means of covert obtaining information. 2020 IEEE 2nd International Conference on Advanced Trends in Information 25.11-27.11. 2020 Kyiv. р.176–181. (Scopus).
- Roman Kochan, Serhii Yevseiev, Roman Korolyov, Stanislav Milevskyi, Imad Ireifidzh, Tomash Gancarczyk and Rafal Szklarczyk. Development of Methods for Improving Crypto Transformations in the Block-Symmetric Code. 5th IEEE International Symposium on Smart and Wireless Systems Within the INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS. 17–18 September 2020. P.130–138.
- Hryshchuk R. Banking security synergetic models [Electronic resource] / R. Hryshchuk, S. P. Yevseiev, N. Romashchenko // 4th International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry, 11-14 April 2019, Antalya / ed.: K. Çetinkaya [et al.]. – Electron. text data. – Türkiye, 2019. – P. 791-807.
- R.Korolev, S. Yevseiev “Research of periodic properties of pseudo-accidental numbers generators, based on the use of excess block codes”. 2019. 4th INTERNATIONAL CONGRESS ON 3D PRINTING (ADDITIVE MANUFACTURING) TECHNOLOGIES AND DIGITAL INDUSTRY
- Aloshin Gennady, Kolomiytsev Aleksey, Posohov Vitalijc, Tkachov Andriid “Вases of theory of optimization of radioelectronic measurers”. 4th INTERNATIONAL CONGRESS ON 3D PRINTING (ADDITIVE MANUFACTURING) TECHNOLOGIES AND DIGITAL INDUSTRY
- Oleksii Tsyhanenko, Serhii Yevseiev, Stanislav Milevskyi. Using the Flawed Codes In Niederreiter Crypto-Code Structure // Short Paper Proceedings of the 1st International Conference on Intellectual Systems and Information Technologies (ISIT 2019), Odessa, Ukraine, August 19–24, 2019. P. 17–19. (Scopus).
- S. Yevseiev and other “Methodology of the cyber security threats risk assessment based on the fuzzy-multiple approach” All Rights Reserved by the International Multidisciplinary Scientific GeoConferences SGEM Published by STEF92 Technology Ltd., 51 “Alexander Malinov” Blvd., 1712 Sofia, Bulgariap. 2019, р. 447–452. (Scopus).
Статті
- Cybersecurity challenges and solutions for critical infrastructure protection / Andrii Tkachov [et al.] // Ukrainian Scientific Journal of Information Security. – 2024. – Vol. 30, iss. 1. – P. 58-66.
- Dudykevych, V and Yevseiev, S and Mykytyn, H and Ruda, K and Hulak, Hennadii (2024) Detecting Deepfake Modifications of Biometric Images using Neural Networks Cybersecurity Providing in Information and Telecommunication Systems 2024, 3654. pp. 391-397.
- Tolkachov, M., Dzheniuk, N., Yevseiev, S., Lysetskyi, Y., Shulha, V., Grod, I., Faraon, S., Ivanchenko, I., Pasko, I., & Balagura, D. (2024). Development of a method for protecting information resources in a corporate network by segmenting traffic . Eastern-European Journal of Enterprise Technologies, 5(9 (131), 63–78.
- Havrylova A., Aksonova I., Khokhlachova Yu., Milevska T., Dunaiev S. Rationale for improving authentication protocols in the conditions of postquantum cryptography // Ukrainian Scientific Journal of Information Security, 2024, vol. 30, issue 1, pp. 130-139.
- Yevseiev, S., Milevskyi, S., Sokol, V., Yemanov, V., Volobuiev, A., Dakova, L., Brailovskyi, M., Rahimova, I., Kravchenko, V., & Cherniavskiy, O. (2024). Development of functionality principles for the automated data transmission system through wireless communication channels to ensure information protection . Eastern-European Journal of Enterprise Technologies, 4(9 (130), 18–33.
- Yevhen Melenti, Serhii Yevseiev, Olha Korol, Stanislav Milevskyi, Vladyslav Khvostenko Application of the innovative approach in the modernization of higher education institutions of the security service of Ukraine. Vol. 30 No. 1 (2024): Ukrainian Scientific Journal of Information Security / Organizational & Law Information Security.
- Nataliia Dzheniuk, Serhii Yevseiev, Stanislav Milevskyi, Natalya Voropay, Roman Korolov Sociocyberphysical System Wireless Air Network Topology Synthesis Model. Vol. 30 No. 1 (2024): Ukrainian Scientific Journal of Information Security / Cybersecurity & Critical Information Infrastructure Protection (CIIP).
- Milevskyi S., Voropay N., Korol O., Yevseiev S., Aksonova I. SSL/TLS protocol on post-quantum algorithms // Ukrainian Scientific Journal of Information Security, 2024, vol. 30, issue 1, pp. 150-156.
- Shmatko, O., Yevseiev, S., Dudykevych, V., Milevskyi, S., Solnyshkova, S., Havrylova, A., Shestak, Y., Oriekhov, S., Korsunov, S., & Kravchenko, S. (2024). Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection. Eastern-European Journal of Enterprise Technologies, 2(9 (128), 36–43.
- Milevskyi, S., Korol, O., Mykytyn, G., Lozova, I., Solnyshkova, S., Husarova, I., Hrebeniuk, A., Vlasov, A., Sukhoteplyi, V., & Balagura, D. (2024). Development of the sociocyberphysical systems` multi-contour security methodology. Eastern-European Journal of Enterprise Technologies, 1(9 (127), 34–51.
- Shmatko, O., Yevseiev, S., Milov, O., Sporyshev, K., Opirskyy, I., Glukhov, S., Rudenko, Y., Nalyvaiko, A., Dakov, S., & Sampir, O. (2024). Development of a model of the information and analytical system for making decisions on detecting failures of information transmission channels. Eastern-European Journal of Enterprise Technologies, 3(9 (129), 28–36.
- Renata DANIELIENE, Sergiy BRONIN, Oleksandr MILOV, Serhii YEVSEIEV Model Basis for Cybersecurity of Socio-Cyberphysical Systems. January 2024 Baltic Journal of Modern Computing 12(2).
- A method of protecting information in cyber-physical space / N. Dzheniuk, S. Yevseiev, B. Lazurenko, O. Serkov, O. Kasilov // Сучасні інформаційні системи = Advanced Information Systems. – 2023. – Т. 7, № 4. – С. 80-85.
- Justification of directions for improving authentication protocols in information and communication systems / A. Havrylova [et al.] // Захист інформації. – 2023. – Т. 25, № 1. – P. 6-19.
- Yevseiev, S., Milov, O., Zviertseva, N., Lezik, O., Komisarenko, O., Nalyvaiko, A., Pogorelov, V., Katsalap, V., Pribyliev, Y., & Husarova, I. (2023). Development of the concept for determining the level of critical business processes security. Eastern-European Journal of Enterprise Technologies, 1(9 (121), 21–40.
- Yevseiev, S., Dzheniuk, N., Tolkachov, M., Milov, O., Voitko, T., Prygara, M., Shpak, O., Voropay, N., Volkov, A., & Lezik, O. (2023). Development of a multi-loop security system of information interactions in socio-cyberphysical systems. Eastern-European Journal of Enterprise Technologies, 5(9 (125), 53–74.
- Shmatko, O., Herasymov, S., Lysetskyi, Y., Yevseiev, S., Sievierinov О., Voitko, T., Zakharzhevskyi, A., Makogon, H., Nesterov, A., & Bondarenko, K. (2023). Development of the automated decision-making system synthesis method in the management of information security channels. Eastern-European Journal of Enterprise Technologies, 6(9 (126), 39–49.
- Сергій Євсеєв, Юрій Тимонін, Сергій Веретюк, Тетяна Войтко, Дмитро Оленюк СИНТЕЗ МОДЕЛІ СОЦІАЛЬНИХ САНКЦІЙ ДЛЯ ЗАБЕЗПЕЧЕННЯ СТІЙКОСТІ ВІРТУАЛЬНИХ СПІЛЬНОТ У ОЦІАЛЬНИХ МЕРЕЖАХ В УМОВАХ АНТАГОНІСТИЧНОГО СЕРЕДОВИЩА. Vol. 25 No. 3 (2023): Ukrainian Scientific Journal of Information Security.
- Станіслав Мілевський РОЗРОБКА КЛАСИФІКАТОРА ЗАГРОЗ У СОЦІОКІБЕРФІЗИЧНИХ СИСТЕМАХ. Vol. 29 No. 3 (2023): Ukrainian Scientific Journal of Information Security / Cybersecurity & Critical Information Infrastructure Protection (CIIP).
- Oleksandr Shmatko, Yaroslav Kliuchka, Roman Korolov, Vladyslav Khvostenko, Sergii Dunaiev DESIGN AND EVALUATION OF AN IOTA-BASED MEDICAL INFORMATION SYSTEM/ Vol. 25 No. 1 (2023): Ukrainian Information Security Research Journal.
- Murr, P., Yevseiev, S., Milevskyi, S., Melnyk, M., Katsalap, V., Pribyliev, Y., Rzayev, K., Bryla, A., Shpak, O., & Fedorka, P. (2023). Development of an error correction method using perfect binary arrays. Eastern-European Journal of Enterprise Technologies, 4(9 (124), 45–53.
- Yevseiev, S., Havrylova, A., Milevskyi, S., Sinitsyn, I., Chalapko, V., Dukin, H., Hrebeniuk, V., Diedov, M., Bekirova, L., & Shpak, O. (2023). Development of an improved SSL/TLS protocol using post-quantum algorithms. Eastern-European Journal of Enterprise Technologies, 3(9 (123), 33–48.
- Yevseiev, S., Herasymov, S., Kuznietsov, O., Opirskyy, I., Volkov, A., Peleshok, Y., Sinitsyn, I., Milevskyi, S., Matovka, T., & Rizak, V. (2023). Method of assessment of frequency resolution for aircraft. Eastern-European Journal of Enterprise Technologies, 2(9 (122), 34–45.
- Yevseiev, S., Tolkachov, M., Shetty, D., Khvostenko, V., Strelnikova, A., Milevskyi, S., & Golovashych, S. (2023). The concept of building security of the network with elements of the semiotic approach. ScienceRise, (1), 24-34.
- Сергій Погасій ОЦІНКА РІВНЯ БЕЗПЕКИ В КІБЕРФІЗІЧНИХ СИСТЕМАХ. Ukrainian Information Security Research Journal, 2022, № 2, p. 81-94.
- R. Korolov, A. Tkachov, N. Voropay, M. Mammadov, E. Baghirov. Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes. Information Processing Systems, 2022, № 1 (168), p. 29-35.
- A. Voropay, S. Pohasii, O. Korol, S. Milevskyi. Development of security mechanisms for scada systems in the postquantium period. Information Processing Systems, 2022, № 2 (169), p. 25-34.
- Алла Гаврилова, Юлія Хохлачова, Володимир Погорелов. Аналіз застосування гібридних крипто-кодових конструкцій для підвищення рівня стійкості геш-кодів до зламу. December 2022. Ukrainian Scientific Journal of Information Security. 2022. Vol. 28 ( 2 ). P. 87-101.
- Pogasii Serhii Моделі і методи захисту інформації в кіберфізічних системах. Ukrainian Scientific Journal of Information Security. 2022. Vol. 28 ( 2). P. 67–40.
- Serhii Yevseiev, Roman Korolev, Mykhailo Koval, Khazail Rzayev, Oleksandr Voitko, Olena Akhiiezer, Alla Hrebeniuk, Stanislav Milevskyi, Elnur Baghirov Musa Mammadov. “Development of a method for ensuring confidentiality and authenticity in wireless channels”. Eastern-European Journal of Enterprise Technologies. 6/9 (120) 2022. P. 15–27.
- Serhii Yevseiev, Khazail Rzaev, Oleksandr Laptiev, Ruslan Hasanov, Oleksandr Milov, Bakhar Askerova, Zhala Jamalova, Serhii Pohasii. Development of a hardware cryptosystem based on a random number generator with two types of entropy sources. Eastern-European Journal of Enterprise Technologies. 2022. 5/9 (119). P. 6–16.
- Serhii Yevseiev, Oleksandr Milov, Ivan Opirskyy, Olha Dunaievska, Oleksandr Huk, Volodymyr Pogorelov, Kyrylo Bondarenko, Nataliia Zviertseva, Yevgen Melenti, Bogdan Tomashevsky. Development of concepts for the cybersecurity metrics classification. Eastern-European Journal of Enterprise Technologies. 4/4 (118). 2022. P. 6–18.
- Serhii Yevseiev, Vitaliy Katsalap, Yurii Mikhieiev, Vladyslava Savchuk, Yurii Pribyliev, Oleksandr Milov, Serhii Pohasii, Ivan Opirskyy, Nataliia Lukova-Chuiko, Ihor Korol. Development of a method for determining the indicators of manipulation based on morphological synthesis. Eastern-European Journal of Enterprise Technologies. 2022. 3/9 (117). P. 22–35.
- Serhii Pohasii, Serhii Yevseiev, Oleksandr Zhuchenko, Oleksandr Milov, Volodymyr Lysechko, Oleksandr Kovalenko, Maryna Kostiak, Andrii Volkov, Aleksandr Lezik, Vitalii Susukailo. Development of crypto code constructs based on LDPC codes. Eastern-European Journal of Enterprise Technologies. 2022. 2/9 (116). P. 44–59.
- Volodymyr Petrivskyi, Viktor Shevchenko, Serhii Yevseiev, Oleksandr Milov, Oleksandr Laptiev, Oleksii Bychkov, Vitalii Fedoriienko, Maksim Tkachenko, Ivan Opirskyy. Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies. 2022. 1/9 (115). P. 15–23.
- Serhii Yevseiev, Alla Havrylova, Olha Korol, Oleh Dmitriiev, Oleksii Nesmiian, Yevhen Yufa. Research of collision properties of the modified UMAC algorithm on crypto-code constructions. “EUREKA: Physical Sciences and Engineering”, № 1. – 2022. Р. 34–44. (Scopus).
- Гаврилова А. А. Аналіз криптографічних алгоритмів поданих до третього туру конкурсу NIST / А. А. Гаврилова // Актуальні питання забезпечення службово-бойової діяльності сил сектору безпеки і оборони : матеріали Всеукр. круг. столу, 23 квіт. 2021 р. : тези допов. / редкол.: Є.О. Меленті, І.В. Євтушенко, О.А. Гарбузов, В.О. Пономарьов – Харків: ФОП Бровін О.В., 2021. – Вип. 5. – С. 361 – 365.
- Shmatko Olexander Порівняння методів машинного навчання для інформаційної системи прогнозування діабету / Olexander Shmatko, Anna Goloskokova, Olha Korol, Irada Rahimova // Системи управління, навігації та зв’язку. Збірник наукових праць. – Полтава: ПНТУ, 2021. – Т. 4 (66). – С. 73-78
- S. Pohasii, S. Milevskyi, O. Zhuchenko, B. Tomashevsky, I. Rahimova, S. Serhiiev. Development of Niederriter crypto-code design models on LDPC-codes. Information Processing Systems, 2021, Issue 4 (167).
- Development of procedures for modifying the cipher GOST 28147 / S. Yevseiev [et al.] // Сучасні інформаційні системи = Advanced Information Systems. – 2021. – Т. 5, № 2. – С. 131-135.
- Yevseiev S. Development of a protocol for a closed mobile Internet channel based on post-quantum algorithms / S. Yevseiev, S. Pohasii, V. Khvostenko // Системи обробки інформації = Information Processing Systems. – 2021. – Вип. 3 (166). – С. 35-40.
- Yevseiev, S., Goloskokova, A., & Shmatko, O. (2021). Researching a machine learning algorithm for a face recognition system. Technology Transfer: Fundamental Principles and Innovative Technical Solutions, 10-12.
- Shmatko, O., Borova, T., Yevseiev, S., Milov, O. (2021). Tokenization of educational assets based on blockchain technologies. ScienceRise: Peda-gogical Education, 3 (42), 04–10
- Yevseiev Serhii Розробка комплексного показника якості обслуговування на основі постквантових алгоритмів / Serhii Yevseiev, Vladyslav Khvostenko, Kyrylo Bondarenko // Системи управління, навігації та зв’язку. Збірник наукових праць. – Полтава: ПНТУ, 2021. – Т. 3 (65). – С. 82-88.
- Шматко О.В., Голоскокова А.О., Мілевський С.В., Воропай Н.І. Інформаційна система розпізнавання зображень. Системи озброєння і військова техніка. 2021. № 4 (68). C. 130-137.
- Serhii Yevseiev, Yurii Ryabukha, Oleksandr Milov, Stanislav Milevskyi, Serhii Pohasii, Yevheniia Ivanchenko, Ihor Ivanchenko, Yevgen Melenti, Ivan Opirskyy, Igor Pasko. Development of a method for assessing forecast of social impact in regional communities. Eastern-European Journal of Enterprise Technologies. 2021. 6/2 (114). P. 30–47. (Scopus).
- Oleksandr Laptiev, Serhii Yevseiev, Larysa Hatsenko, Olena Daki, Vitaliy Ivanenko, Valery Fedunov, Spartak Hohoniants. The method of discretization signals to minimize the fallibility of information recovery. International Journal of Communication Networks and Information Security (IJCNIS). Vol 13, No 3 (2021). рр340-348. (Scopus).
- Войтко О.В., Солонніков В.Г., Полякова О.В., Ткачов А.М. Рівняння періодичних режимів, які враховують особливості динаміки їх протікання в нелінійних автоматичних системах з ЕОМ в контурі управління (engl.). Системи обробки інформації. 2021. № 1(164). C. 12-20.
- Yevseiev and other. Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Eastern-European Journal of Enterprise Technologies. 2021. 5/9 (113). P. 30–47. (Scopus).
- Yevseiev and other. Development of a method for estimating the effect of ransformation of the normalized frequency mismatch function of a coherent bundle of radio pulses on the quality of radar frequency resolution. Eastern-European Journal of Enterprise Technologies. 2021. 4/4 (112). P. 13–22. (Scopus).
- Milov, O.; Yevseiev, S.; Milevskyi, S.; Kajstura, K.; Ziubina, R. Critical Points of Information Influence in Social Networks, CEUR Workshop Proceedings, Volume 3200, 2021, Pages 122-127
- Stanislav Milevskyi, Volodymyr Aleksiyev, Olha Korol, Oleksandr Milov, and Serhii Yevseiev. Security Analysis Models for Multimedia Information Resources in Social Networks. Cybersecurity Providing in Information and Telecommunication Systems, January 28, 2021, Kyiv, Ukraine. Р. 60–67. (Scopus).
- Yevseiev and other. Development of conception for building a critical infrastructure facilities security system. Eastern-European Journal of Enterprise Technologies. 2021. 3/9 (111). P. 63–83. (Scopus).
- Yevseiev and other. Development of an optimization method for measuring the doppler frequency of a bucket with account for the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies. 2021. 2/9 (110). P. 6–15. (Scopus).
- S. Yevseiev and other. Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency. Eastern-European Journal of Enterprise Technologies. 2021. 1/2 (109). р. 14–23. (Scopus).
- S. Yevseiev, O. Laptiev, S. Lazarenko, A. Korchenko, І. Manzhul Modeling the protection of personal data from trust and the amount of information on social. “EUREKA: Physical Sciences and Engineering”, № 1. – 2021. Р. 24–31. (Scopus).
- Gavrilova A. Development of a modified UMAC algorithm based on crypto-code constructions / A. Gavrilova, I. Volkov, Y. Kozhedub et. al. // Eastern-European Journal of Enterprise Technologies. – 2020. – 4/9 (106) – РР. 45-63.
- Shmatko O. Development of methodological foundations for designing a classifier of threats to cyberphysical systems / O. Shmatko, S. Balakireva, А. Vlasov et al. // Eastern-European Journal of Enterprise Technologies. – 2020. – 3/9 (105). – Pp. 6-19.
- Milov, Oleksandr and Hrebeniuk, Andrii and Nalyvaiko, Andrii and Nyemkova, Elena and Opirskyy, Ivan and Pasko, Igor and Rzayev, Khazail and Salii, Anatolii and Synytsina, Uliia and Soloviova, Olha, Development of the Space-Time Structure of the Methodology for Modeling the Behavior of Antagonistic Agents of the Security System (December 25, 2020). Eastern-European Journal of Enterprise Technologies, 6(2 (108)), 30-52, 2020.
- Korol O. Mathematical models of hybrid crypto-code constructions in the UMAC algorithm / O. Korol, A. Havrylova. // Przetwarzanie, transmisja i bezpieczenstwo informacji. – Bielsko-Biala : Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej, 2020, Vol. 12. – S. 125-134.
- S. Yevseiev, O. Rayevnyeva, V. Ponomarenko, O. Milov, Development of methodological principles for the construction of a corporate information educational system of innovative-active University in the framework of anticorruption activities. Eastern-European Journal of Enterprise Technologies. 2020. 5/2(107). р. 6–28. (Scopus).
- Serhii Yevseiev, Roman Korolyov, Andrii Tkachov, Oleksandr Laptiev, Ivan Opirskyy, Olha Soloviova. Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period. International Journal of Advanced Trends in Computer Science and Engineering. Volume 9, No.5, September – October 2020. P. 8725–8729. (Scopus).
- S. Yevseiev and other “Development of an advanced method of video information resource compression in navigation and traffic control systems”. “EUREKA: Physical Sciences and Engineering”, № 5. – 2020. P. 31–42. (Scopus).
- S. Yevseiev and other. Development and analysis of game the theoretical models of security systems agents interaction. Eastern-European Journal of Enterprise Technologies . 2020. 2/4(104). р. 15–29. (Scopus).
- S. Yevseiev and other “Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems”. “EUREKA: Physical Sciences and Engineering”, № 1. – 2020. р. 48–55. (Scopus).
- Milov O. Creation of a methodology for building security systems for multimedia information resources in social networks / O. Milov, S. Milevskyi, V. Aleksiyev. // Przetwarzanie, transmisja i bezpieczenstwo informacji. – Bielsko-Biala : Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej, 2020. – Vol. 12. – S. 185-192.
- Korol O. Practical UMAC algorithms based on crypto code designs / O. Korol, A. Havrylova, S. Yevseiev // Przetwarzanie, transmisja I bezpieczenstwo informacji : Wydawnictwo naukowe Akademii Techniczno-Humanistycznej w Bielsku-Bialej. – Bielskо-Bialа, 2019. – Tom 2. – S. 221–232.
- Havrylova A. А. Mathematical model of authentication of a transmitted message based on a McEliece scheme on shorted and extended modified elliptic codes using UMAC modified algorithm / A. A. Havrylova, O. H. Korol, S. V. Milevskyi, L. R. Bakirova // Кібербезпека : освіта, наука, техніка. – 2019. – No 1(5). – P. 40–51.
- Yevseiev, S., Bakirova, L. R., & Sushchenko, M. (2019). MATHEMATICAL MODELS OF HYBRID CRYPTO CODE CONSTRUCTIONS ON DAMAGED CODES. Advanced Information Systems, 3(3), 87–103. https://doi.org/10.20998/2522-9052.2019.3.13
- Yevseiev S. Research of criteria of modified non-symmetric crypto-code construction of McEliece on extended elliptic codes / S. Yevseiev // Наука і техніка Повітряних Сил Збройних Сил України = Science and Technology of the Air Force of Ukraine. – 2019. – № 4 (37). – С. 80-92.
- O. Milov, S. Milevskyi, S. Pohasii, K. Rzayev “Procedural basis of cybersecurity systems”. Control, navigation and communication systems, 2019, № 57, p. 72-77
- Milov O. Засоби моделювання поведінки агентів в інформаційно-комунікаційних система / O. Milov, M. Kostyak, S. Milevsky, S. Pogasiy // Системи управління, навігації та зв’язку. Збірник наукових праць. – Полтава: ПНТУ, 2019. – Т. 6 (58). – С. 63-70.
- Yevseiev S. Methodology for Building A Security System for Banking Information Resources / S. Yevseiev // Symposium on Proceedings & Abstracts Book of the International Data Science & Engineering (IDSES’19), May 02-03, 2019 / ed. F. Ersöz ; Karabük University. – Karabük : Karabük Univ. Publ., 2019. – P. 10-11.
- Oleksandr Milov, Nadiia Kazakova, Piotr Milczarski, Olha Korol “Mechanisms of cyber security: the problem of conceptualization”. Ukrainian Scientific Journal of Information Security, 2019. p. 96-103.
- Shmatko, O., Dong, L., Havrylova, A., & Aleksiyev, V. (2019). A NEW FRAMEWORK DESIGNED FOR KNOWLEDGE MANAGEMENT IN DISTRIBUTED SOFTWARE DEVELOPMENT. Advanced Information Systems, 3(1), 109–115.
- Milov, O. (2019). ADAPTIVE DECISION SUPPORT SYSTEMS FOR CYBER SECURITY. Advanced Information Systems, 3(1). p. 131–135.
- Milov O. Development of the classification of the cyber security agents bounded rationality / O. Milov, O. Korol, V. Khvostenko // Системи управління, навігації та зв’язку. – 2019. – Вип. 4 (56). – С. 82–86.
- O. Milov, A. Voitko, I. Husarova, O. Domaskin, Е. Ivanchenko, I. Ivanchenko, O. Korol, H. Kots, I. Opirskyy, O. Fraze-Frazenko “Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems”. Eastern-European Journal of Enterprise Technologies . 2019. 2/9 (98). р. 56–66. (Scopus).
- Serhii Yevseiev, Olha Korol, Alla Havrylova “Development of authentication codes of messages on the basis of umac with crypto-code mceliece’s scheme”. “INTERNATIONAL JOURNAL OF 3D PRINTING TECHNOLOGIES AND DIGITAL INDUSTRY 3:2 (2019) 153-170 Araştırma Makalesi/Research Articles
- S. Yevseiev and other “Development of a scenario modeling of conflicts tools in a security system based on formal grammars”. Eastern-European Journal of Enterprise Technologies . 2019. 6/9(102). р. 22–39. (Scopus).
- S. Yevseiev and other “Development of the interacting agents behavior scenario in the cyber security system”. Eastern-European Journal of Enterprise Technologies. 2019. 5/9 (101). р. 46–57. (Scopus).
- S. Yevseiev and other “Development the model of the antagonistic agent’s behavior under a cyber-conflict”. Eastern-European Journal of Enterprise Technologies. 2019. 4/9(100). р. 6–19. (Scopus).
- S. Yevseiev and other “Development of a methodology for building a security information system in the corporate research and education system in the context of university autonomy”. Eastern-European Journal of Enterprise Technologies. 2019. 3/9(99). р. 49–63. (Scopus).
- S. Yevseiev and other “Development of Niederreiter hybrid crypto-code structure on flawed codes” Eastern-European Journal of Enterprise Technologies, 1/9 (97). p. 27 –37, 2019. (Scopus).
- Milov O. Development of basic principles for corporate planning / O. Milov, S. Milevskyi, O. Korol // Системи обробки інформації. – 2019. – Вип. 1. – С. 28-36.
- Milov O. Процедурний базис систем кібербезпеки / O. Milov, S. Milevskyi, S. Pohasii, K. Rzayev // Системи управління, навігації та зв’язку. Збірник наукових праць. – Полтава: ПНТУ, 2019. – Т. 5 (57). – С. 72-77. – doi:https://doi.org/10.26906/SUNZ.2019.5.072.
Монографії
- Євсєев С.П. Методологія синтезу моделей інтелектуальних систем управління та безпеки об’єктів критичної інфраструктури. Монографія/ С.П. Євсеєв, О.Ю. Заковоротний, О.В. Мілов, Г.А. Кучук, О.А. Галуза, М.В. Коваль, О.В. Войтко, Р.В. Грищук– Харків: Вид. «Новий Світ-2000», 2024. – 299 с. (Укр. мов.)
- Models of socio-cyber-physical systems security: monograph / S. Yevseiev, Yu. Khokhlachova, S. Ostapov, O. Laptiev and others. – Kharkiv: PC TECHNOLOGY CENTER, 2023. – 168 p.
- Modeling of security systems for critical infrastructure facilities: monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych and others. – Kharkiv: PC TECHNOLOGY CENTER, 2022. – 196 p.
- Synergy of building cybersecurity systems: monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. – Kharkiv: PC TECHNOLOGY CENTER, 2021. – 188 p.(Scopus).
Посібники
- Комп’ютерні мережі. [Книга 1. Технології комп’ютерних мереж]: [Навчальний посібник]./ Євсеєв С.П., Дженюк Н.В., Толкачов М.Ю та ін. – Харків, – Львів: Видавництво ПП «Новий Світ – 2000», 2023. – 471 c. (Укр. мов.)
- Євсєев С.П. Кібербезпека: основи кодування та криптографії/ С.П. Євсеєв, О.В. Мілов, С.Е. Остапов, О.В. Сєвєрінов. – Харків: Вид. “Новий Світ-2000”, 2023. – 657 с. (Укр. мов.)
- Цифрова схемотехніка та архітектура мікропроцесорів: навчальний посібник / Євсеєв С. П., Дженюк Н. В., Охрименко М. Ю. та ін. – Харків, – Львів: Видавництво ПП “Новий Світ – 2000”, 2023. – 513 с. (Укр. мова)
- Євсеєв С.П. КІБЕРБЕЗПЕКА: КРИПТОГРАФІЯ З PYTHON: навч. посібн. / С.П.Євсеєв, О.В. Шматко, О.Г. Король – Харків: Видавництво «Новий Світ – 2000», 2021. –120 с. (Укр. мова)
- КІБЕРБЕЗПЕКА: WEB-технології [Електронний ресурс]: Навчально-довідковий посібник / С.П. Євсеєв, А.М. Ткачов, В.О. Алексієв, Ю.М. Рябуха – Харків : ХНЕУ ім. С. Кузнеця, – Львів: Видавництво «Новий Світ –2000», 2021. – 390 с. (укр. мов.)
- Технології захисту інформації./ С. Е. Остапов, С. П. Євсєєв, О.Г. Король. – Чернівці : Чернівецький національний університет, 2013. – 471 с. (Укр. мов.)
- Кузнецов О. О. Стеганографія : навчальний посібник / О. О. Кузнецов, С. П. Євсеєв, О. Г. Король. – Х. : Вид. ХНЕУ, 2011. – 232 с. (Укр. мов.)
Лабораторні практикуми
- CYBERSECURITY: Security of Linux operating system: laboratory workshop / S. Yevseiev, S. Pogasiy, A. Goloskokova, O. Shmatko, M. Melnik (Кібербезпека: безпека операційної системи Linux: лабораторний практикум: навчальний посібник для студентів вищих навчальних закладів англійською мовою / Євсеєв С.П., Погасій С.С., Голоскокова А.О., Шматко О.В., Мельник М.О. – Львів: Видавництво «Новий Світ – 2000», 2021. – 256 с.
- Євсеєв С.П. КІБЕРБЕЗПЕКА: ЛАБОРАТОРНИЙ ПРАКТИКУМ З ОСНОВ КРИПОГРАФІЧНОГО ЗАХИСТУ / С.П. Євсеєв, О.В. Мілов, О.Г. Король – Львів: «Новий Світ- 2000», 2020 . – 241 с.
- Технологія Ethernet : лабораторний практикум / М. О. Білова, С. П. Євсеєв, О.С. Жученко, І.С. Іванченко, О.В. Шматко.– Львів: «Новий Світ- 2000», 2020 . – 196 с.