PERSONAL INFORMATION

National Technical University “Kharkiv Polytechnic Institute”, Professor of Cybersecurity Department, Educational and Scientific Institute of Computer Science and Information Technology
Kyrpychova str. 2, Kharkiv, 61002, Ukraine
+ 380 66 716 59 73 +380 66 716 59 73
Stanislav.Milevskyi@khpi.edu.ua
Sex Male | Date of birth 06/03/1979
WORK EXPERIENCE
| National Technical University “Kharkiv Polytechnic Institute”, Professor of Cybersecurity Department, Educational and Scientific Institute of Computer Science and Information Technology |
| since 2022 |
| Teaching and developing undergraduate and graduate courses in cybersecurity, ensuring curricula aligned with current industry and research trends. Supervising student research projects, theses, and dissertations, mentoring junior faculty and fostering academic growth. Conducting research, publishing in leading journals and conferences. Engagement with industry, government, and research institutions is essential to strengthen partnerships and enhance the practical relevance of academic programs. Organizing and participating in conferences, workshops, and seminars that advance cybersecurity knowledge. Serving on committees, supporting recruitment, and contributing to program evaluation and quality assurance. Expert input into cybersecurity awareness, policy development, and national and international security initiatives. |
| S. Kuznets Kharkiv National University of Economics, Associate Professor, Department of Cyber Security and Information Technologies |
| 2020-2022 |
| Teaching and developing courses in cybersecurity. Supervising student research projects, theses, and dissertations. Conducting research, publishing in leading journals and conferences. Engagement with industry, government, and research institutions is essential to strengthen partnerships and enhance the practical relevance of academic programs. Organizing and participating in conferences, workshops, and seminars that advance cybersecurity knowledge. |
| S. Kuznets Kharkiv National University of Economics, Deputy Dean of the Faculty of Economic Informatics |
| 2018-2021 |
| Academic leadership, curriculum development, and faculty coordination. Overseeing quality assurance, accreditation processes, and implementation of educational standards. Supporting strategic planning, budgeting, and resource allocation to enhance faculty performance. Facilitation of collaboration between departments, industry partners, and research institutions. Providing mentorship to students and staff, while promoting innovation in teaching, research, and digital transformation in economic informatics. |
| S. Kuznets Kharkiv National University of Economics, Associate Professor, Department of Economic Cybernetics |
| 2008-2019 |
| Teaching and developing courses in economic cybernetics. Supervising student research projects, theses, and dissertations. Conducting research, publishing in leading journals and conferences. Organizing and participating in conferences, workshops, and seminars that advance cybersecurity knowledge. |
| S. Kuznets Kharkiv National University of Economics, Lecturer, Department of Economic Cybernetics |
| 2005-2008 |
| Teaching and developing courses in economic cybernetics. Supervising student research projects, theses, and dissertations. Conducting research, publishing in leading journals and conferences. Organizing and participating in conferences, workshops, and seminars that advance cybersecurity knowledge. |
EDUCATION AND TRAINING
| Doctor of Technical Sciences in specialty 05.13.21 – Information Protection Systems on the topic “Methodology of Constructing Security Systems for Multimedia Resources in Internet-Services” |
| • the concept of a multi-contour security system in social Internet-services of socio-cyber-physical systems was developed • the model of the multi-contour information protection system in social internet services, developed on the basis of the concept, takes into account threats to the internal and external contours of socio-cyber-physical systems and opens a new direction in ensuring the security of information resources in social internet services based on the construction of a security system based on post-quantum algorithms • dynamic security models of social Internet services in socio-cyber-physical systems have been developed, which allows: to take into account computational capabilities, competitive interactions between attackers and their “victims”, which makes it possible to determine preventive measures against targeted (mixed) attacks in a timely manner • a method for ensuring the confidentiality and integrity of information resources in social Internet services has been developed, which is based on hybrid crypto-code constructions with lossy codes based on McEliece’s crypto-code construction on LDPC codes, which allows to increase the level of information concealment and reliability of information resources in the conditions of the action of hybrid threats • a method of ensuring the authenticity of information resources has been developed, which is based on the improved SSL/TLS protocol based on McEliece’s crypto-code constructions, which allows the implementation of security services in the conditions of the post-quantum period • the classifier of threats to the security of information resources in socio-cyberphysical systems has been improved, which takes into account the signs of synergy and hybridity, integration with methods of social engineering of targeted attacks, which allows to generalize the classification of threats, determine critical points of the infrastructure and form preventive countermeasures (National University “Lviv Polytechnic”) |
| PhD in Economic Sciences, specialty 08.03.02 “Economic-Mathematical Modelling” |
| • complex model of the enterprise competitiveness estimation al-lows to carry out scanning and monitoring of the enterprise competitiveness for the basic parameters of activity without application of expert estimations at a level of the final user developed • the model for choose of competitive strategy on the basis of results of competitiveness estimation allows to formalize this process developed • the model for the enterprise development script chooses, which is based on the theory of return calculations allows to determine a direction of the enterprise devel-opment on a planned condition and changes which are necessary for its achievement (Kharkiv National University of Economics) |
| Master of Cybersecurity, Administrative Management in the Field of Information Protection |
| • Mastering advanced methods of cybersecurity and information protection. • Managing security policies, resources, and teams in organizations. • Apply innovative solutions to counter modern cyber threats. (National Aviation University) |
| Specialist in Economics, Economy of Enterprises |
| • Master methods of economic analysis and enterprise management. • Develop and implement strategies for sustainable business growth. • Apply innovative economic tools to improve efficiency and competitiveness. (Kharkiv State University of Economics) |
PERSONAL SKILLS
| Mother tongue(s) | Ukrainian, Russian | ||||
| Other language(s) | UNDERSTANDING | SPEAKING | WRITING | ||
| Listening | Reading | Spoken interaction | Spoken production | ||
| English | English С1 | English С1 | English С1 | English С1 | English С1 |
| Certificate of English language proficiency (level B225348, issued on 06/21/2019 by the municipal extracurricular educational institution “First Kyiv State Courses of Foreign Languages” | |||||
| Job-related skills | Took part in 3 different international projects: CRDF Global G-202301-69857 “Integration of new Cybersecurity course into the Curriculum of the National Technical University “Kharkiv Polytechnic Institute”, CRDF Global project “Promotion of the Cyber Hygiene E-learning”, USAID Project APS-CCI-001 “Cybersecurity of critical importance” infrastructure of Ukraine”. | ||||
ADDITIONAL INFORMATION
| Publications ORCID: https://orcid.org/0000-0001-5087-7036 1.Synergy of building cybersecurity systems. Kharkiv: Рс Тесhnology Сеntеr. 2021. 188 p. DOI: 10.15587/978-617-7319-31-2. 2. Modeling of security systems for critical infrastructure facilities: monograph. Kharkiv: Рс Тесhnology Сеntеr. 2022. 196 p. DOI: 10.15587/978-617-7319-57-2. 3. Development of a method for assessing forecast of social impact in regional communities. Eastern-European Journal of Enterprise Technologies, 2021. № 6/2 (114). P. 30-43. DOI: 10.15587/1729-4061.2021.249313. 4. Development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model. Eastern-European Journal of Enterprise Technologies, 2021. № 5/9 (113). P. 30–47. DOI: 10.15587/1729-4061.2021.241638. 5. Development of the model of the antagonistic agents behavior under a cyber conflict. Eastern-European Journal of Enterprise Technologies, 4(9 (100), 6–19. DOI: 10.15587/1729-4061.2019.175978. 6. Development and analysis of game-theoretical models of security systems agents interaction. Eastern-European Journal of Enterprise Technologies, 2(4 (104), 15–29. DOI: 10.15587/1729-4061.2020.20141816. 7. Development of a method for estimating the effect of transformation of the normalized frequency mismatch function of a coherent bundle of radio pulses on the quality of radar frequency resolution . Eastern-European Journal of Enterprise Technologies, 4(4(112), 13–22. DOI: 10.15587/1729-4061.2021.238155. 8. Development of an error correction method using perfect binary arrays. Eastern-European Journal of Enterprise Technologies, 4(9 (124), 45–53. DOI: 10.15587/1729-4061.2023.285540. 9. Development of a Method for Ensuring Confidentiality and Authenticity in Wireless Channels (December 30, 2022). Eastern-European Journal of Enterprise Technologies, 6(9 (120), 15–27. DOI: 10.15587/1729-4061.2022.268368. 10. Development of the sociocyberphysical systems` multi-contour security methodology. Eastern-European Journal of Enterprise Technologies, 1(9 (127), 34–51. DOI: 10.15587/1729-4061.2024.298844. 11. Simulation Of A Distributed Decision-Making System In Cyber Security International Journal Of 3d Printing Technologies And Digital Industry 3:2 (2019) 147-152 Araştırma Makalesi/Research Articles. 12. Analysis of information security threat assessment of the objects of information activity International independent scientific journal. Poland. Vol. 1, №34, 2021, pp.33 – 39. ISBN 978-83-949403-4-8. 13. The concept of building security of the network with elements of the semiotic approach ScienceRise, No. 1 (84), 2023, Р. 24–34 DOI: 10.21303/2313-8416.2023.002828. 14. Development of Niederriter crypto-code design models on LDPC-codes. Information Processing Systems, 2021. № 4 (167). P. 58-68. DOI: 10.30748/soi.2021.167.05. 15. Development of security mechanisms for SCADA systems in the postquantium period. Information Processing Systems, 2022. Issue 2 (169). P. 25 – 33. DOI: 10.30748/soi.2022.169.03. 16. Development of the double-contour protection concept in socio-cyberphysical systems. Advanced Information Systems, 2022. № 6 (2). P. 57-66. DOI: 10.20998/2522-9052.2022.2.10. 17. Development of basic principles for corporate planning Information Processing Systems, 2019, issue 1 (156). pp. 28-35 DOI: 10.30748/soi.2019.156.04. 18. Procedural basis of cybersecurity systems. Control, navigation and communication systems. Poltava: PNTU, 2019. Issue 5 (57). Pp. 81-86. DOI: 10.26906/SUNZ.2019.5.072. 19. Verification of the security systems antagonistic agents behavior model Information Processing Systems, 2019, № 4(159). – Р. 65–81. DOI: 10.30748/soi.2019.159.08. 20. Developing an advanced classifier of threat for security agent behavior models Science and Technology of the Air Force of the Armed Forces of Ukraine, 2019, No. 4(37). P. 105-112. DOI: 10.30748/nitps.2019.37.15. 21. Means of modeling agent behavior in information and communication systems Systems, navigation, control and communication. 6(58), 2019. – P. 63–70. DOI: 10.26906/SUNZ.2019.6.063. 22. Peculiarities of blockchain technology introduction in the field of healthcare: current situation and prospects Information Processing Systems, 2021, Issue 1 (164), р. 33–43. DOI: 10.30748/soi.2021.164.04. 23. Development of a threat classifier in socio-cyber-physical systems // Ukrainian Scientific Journal of Information Security, 2023, vol. 29, issue 3, pp. 118-123 DOI: 10.18372/2225-5036.29.18070. 24. Security models of socio-cyber-physical systems // Ukrainian Information Security Research Journal, 2023, vol. 25, issue 4, pp. 191-197 DOI: 10.18372/2410-7840.25.18224. 25. Mathematical model of authentication of a transmitted message based on a McEliece scheme on shorted and extended modified elliptic codes using UMAC modified algorithm Cybersecurity: education, science, technology / No. 1 (5), 2019. – P. 40-51 DOI: 10.28925/2663-4023.2019.5.4051. 26. Development of a method of psychological impact on target audiences of gamers using modern information technologies. Eastern-European Journal of Enterprise Technologies, 3(9 (135), 55–64. https://doi.org/10.15587/1729-4061.2025.332271. 27. Development of post-quantum cryptosystems based on the Rao-Nam scheme. Eastern-European Journal of Enterprise Technologies, 1(9 (133), 35–48. https://doi.org/10.15587/1729-4061.2025.323195. 28. Development of a method for assessing the efficiency of technical systems’ computer dynamic simulators. Eastern-European Journal of Enterprise Technologies, 2(9 (134), 50–61. https://doi.org/10.15587/1729-4061.2025.327558. 29. Development of a Method for Evaluating Data Transmission in Cyber-Physical Systems. In: Durakbasa, N.M., Cetinkaya, K., Demircioglu, P., Bogrekci, I. (eds) Digitalization in Additive Manufacturing. ICPTDI 2024. Springer Tracts in Additive Manufacturing. Springer, Cham. https://doi.org/10.1007/978-3-031-84873-5_37. 30. Development of a Method for Comprehensive Evaluation of the Service Provision Quality. In: Durakbasa, N.M., Cetinkaya, K., Demircioglu, P., Bogrekci, I. (eds) Digitalization in Additive Manufacturing. ICPTDI 2024. Springer Tracts in Additive Manufacturing. Springer, Cham. https://doi.org/10.1007/978-3-031-84873-5_36. 31. Prospects for the Development of UAVs Using CFRP and 3D Printing. In: Durakbasa, N.M., Cetinkaya, K., Demircioglu, P., Bogrekci, I. (eds) Digitalization in Additive Manufacturing. ICPTDI 2024. Springer Tracts in Additive Manufacturing. Springer, Cham. https://doi.org/10.1007/978-3-031-84873-5_26. Presentations Conferences Seminars 1. Cybersecurity issues in the internet of things. 1st International Conference: Modern Information, Measurement and Control Systems: Problems and Perspectives (MIMCS’2019), 2019. P. 33. ISSN: 1987-6521, E-ISSN: 2346-7541; DOI PREFIX: 10.23747. 2. Internet security problems caused by artificial intelligence. Materials of the International Scientific and Practical Conference “Economic Development and the Legacy of Semyon Kuznets”: abstracts of reports, May 30-31, 2019. Kh.: Semyon Kuznets KhNEU, 2019. P. 248-249. 3. Socio-Cyber-Physical Systems Security Concept, 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara, Turkey, 2022. P. 1-8. DOI: 10.1109/HORA55278.2022.9799957. 4. Requirements for the properties of agents and multi-agent systems in the models of cybersecurity 1st International Conference: Modern Information, Measurement and Control Systems: Problems and Perspectives (MIMCS’2019), 01-02 July, Baku, AZERBAIJAN. – P. 258-259 ISSN: 1987-6521, E-ISSN: 2346-7541; DOI PREFIX: 10.23747. 5. Using the Flawed Codes In Niederreiter Crypto-Code Structure Short Paper Proceedings of the 1st International Conference on Intellectual Systems and Information Technologies (ISIT 2019), Odessa, Ukraine, August 19–24, 2019. P. 17–19 (2019) CEUR Workshop Proceedings, 2683, pp. 15 – 17. 6. Development of Methods for Improving Crypto Transformations in the Block-Symmetric Code 5th IEEE International Symposium on Smart and Wireless Systems Within the International conference on intelligent data acquisition and advanced computing systems. 17–18 September 2020. P.130–138 DOI: 10.1109/IDAACS-SWS50031.2020.9297102. 7. Security Analysis Models for Multimedia Information Resources in Social Networks Cybersecurity Providing in Information and Telecommunication Systems, January 28, 2021, Kyiv, Ukraine. Р. 60–67. (2021) CEUR Workshop Proceedings, 2923, pp. 60 – 67. 8. Cyber terrorism as an object of modeling International Scientific And Practical Conference «Information Security And Information Technologies»: Conference Proceedings. Kharkiv – Odesa : Simon Kuznets Kharkiv National University of Economics, 2021. CEUR Workshop Proceedings 298 p., Р. 215–222. 9. Measuring Signals Synthesis Method on the Basis of Triangular Time-Pulse Modulation for Control of Radiotechnic Systems Technical Condition. Concept 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. June 9-11, 2022, Ankara, Turkey DOI: 10.1109/HORA55278.2022.9799986. 10. Metody ochrony informacji w systemach cyber- fizycznych XII conference «Engineer of XXI Century». «Processing, Transmission and Security of Information – 2022». p.158-171 DOI: 10.53052/9788367652001.15. 11. Real-Time Cybersecurity Risk Assessment (2021) CEUR Workshop Proceedings, 3200, pp. 295 – 309. 12. Detection of Intrusion Attacks Using Neural Networks (2021) CEUR Workshop Proceedings, 3200, pp. 107 – 114. 13. Critical Points of Information Influence in Social Networks (2021) CEUR Workshop Proceedings, 3200, pp. 122 – 127. 14. Research of Periodic Properties of the Generator Based on m-ary Codes 2022 IEEE 3rd KhPI Week on Advanced Technology, KhPI Week 2022 – Conference Proceedings. DOI: 10.1109/KhPIWeek57572.2022.9916365. 15. Sociocyberphysical Security Systems Synthesis Models 7th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2023 – Proceedings, DOI: 10.1109/ISMSIT58785.2023.10304965. 16. Information Influence on the Virtual Community: Implementation Features and Method of Detection in Social Internet Services 7th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2023 – Proceedings, DOI: 10.1109/ISMSIT58785.2023.10305001. 17. Development of a Sociocyberphysical Systems Cyber Threats Classifier 7th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2023 – Proceedings, DOI: 10.1109/ISMSIT58785.2023.10304895. 18. Phase-Modulated Signals Synthesis Method to Control Information Transmission Channels 2023 IEEE 4th KhPI Week on Advanced Technology, KhPI Week 2023 – Conference Proceedings, DOI: 10.1109/KhPIWeek61412.2023.10312859. 19. Method for Reducing the Frequency Spectrum Overlaying Error in Digital Narrow-Band Filtration,” 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Istanbul, Turkiye, 2024, pp. 1-5, doi: 10.1109/HORA61326.2024.10550889. 20. Authentication and Authorization Method Based on McEliece Crypto-Code Construction,” 2024 8th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Ankara, Turkiye, 2024, pp. 1-5, doi: 10.1109/ISMSIT63511.2024.10757296. 21. Entropy Method for Assessing the Strength of Encryption Algorithms,” 2024 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Istanbul, Turkiye, 2024, pp. 1-9, doi: 10.1109/HORA61326.2024.10550669. 22. Smart Contracts: Classification Problems,” 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), Ankara, Turkiye, 2025, pp. 1-4, doi: 10.1109/ICHORA65333.2025.11017320. 23. Methodological Foundations for Constructing Intelligent Information Security Systems, 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), Ankara, Turkiye, 2025, pp. 1-6, doi: 10.1109/ICHORA65333.2025.11017207. Projects CRDF Global G-202301-69857 “Integration of new Cybersecurity course into the Curriculum of the National Technical University “Kharkiv Polytechnic Institute” CRDF Global project “Promotion of the Cyber Hygiene E-learning” USAID Project APS-CCI-001 “Cybersecurity of Critical Infrastructure of Ukraine”, 1.04.24– 31 March 2024 Memberships Member of the public organization “Eastern European Scientific Society”, certificate ES No. 053 |