Cyber security risk modeling in distributed information systems D Palko, T Babenko, A Bigdan, N Kiktev, T Hutsol, M Kuboń, H Hnatiienko, ... Applied Sciences 13 (4), 2393, 2023 | 22 | 2023 |
Detection of sql injection attack using neural networks O Hubskyi, T Babenko, L Myrutenko, O Oksiiuk International scientific-practical conference, 277-286, 2020 | 21 | 2020 |
The building of a security strategy based on the model of game management S Toliupa, T Babenko, A Trush 2017 4th International Scientific-Practical Conference Problems of …, 2017 | 20 | 2017 |
Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data. H Hnatiienko, NA Kiktev, T Babenko, A Desiatko, L Myrutenko ITS, 169-180, 2021 | 16 | 2021 |
Методика навчання англійської мови в початковій школі: навч. посіб ТВ Бабенко Київ: Арістей, 2006 | 15 | 2006 |
Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems. T Babenko, H Hnatiienko, V Ignisca, M Iavich IVUS, 92-101, 2021 | 14 | 2021 |
An intelligent model to assess information systems security level T Viktoriia, H., Hnatienko, H., Babenko Proceedings of the 2021 5th World Conference on Smart Trends in Systems …, 2021 | 12* | 2021 |
Model of Information Security Critical Incident Risk Assessment A Palko, D., Myrutenko, L., Babenko, T., Bigdan 2020 IEEE International Conference on Problems of Infocommunications Science …, 2021 | 10* | 2021 |
Modeling of the Integrated Quality Assessment System of the Information Security Management System. T Babenko, H Hnatiienko, V Vialkova IT&I Workshops, 75-84, 2020 | 9 | 2020 |
LVQ models of DDOS attacks identification T Babenko, S Toliupa, Y Kovalova 2018 14th International Conference on Advanced Trends in Radioelecrtronics …, 2018 | 9 | 2018 |
Дослідження ентропії мережевого трафіка як індикатора DDOS-атак ТВ Бабенко Науковий вісник Національного гірничого університету, 86-89, 2013 | 9 | 2013 |
Eliminating privilage escalation to root in containers running on kubernetes L Artem, B Tetiana, M Larysa, V Vira Scientific and practical cyber security journal, 2020 | 8 | 2020 |
Determining Key Risks for Modern Distributed Information Systems. D Palko, H Hnatiienko, T Babenko, A Bigdan IntSol, 81-100, 2021 | 7 | 2021 |
Системи водопостачання населених пунктів України ТВ Бабенко, ЮВ Почта Науковий вісник Національного гірничого університету, 105-108, 2012 | 7 | 2012 |
Mechanism of aventurine formation in copper-containing alkali-lead silicate glass MD Shcheglova, TV Babenko, SG Polozhai, VM Svistun Glass and ceramics 53, 14-17, 1996 | 7 | 1996 |
Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements. H Hnatiienko, V Hnatiienko, R Zulunov, T Babenko, L Myrutenko CPITS, 301-311, 2024 | 6 | 2024 |
Modeling of information security system and automated assessment of the integrated quality of the impact of controls on the functional stability of the organizational system B Tetiana, H Hnatiienko, V Vira CEUR Workshop Proceedings, 188-198, 2021 | 4 | 2021 |
Secure software developing recommendations V Grechko, T Babenko, L Myrutenko 2019 IEEE International Scientific-Practical Conference Problems of …, 2019 | 4 | 2019 |
Information security problems of educational electronic information resources. TV Babenko, O Tretiak, OV Kruchinin, DS Tymofieiev Scientific bulletin of national mining university, 2012 | 4 | 2012 |
Методика викладання англійської мови в початковій школі: Навчальний посібник. ТВ Бабенко Київ: Арістей, 220, 2005 | 4 | 2005 |