关注
Ievgeniia Kuzminykh
Ievgeniia Kuzminykh
King's College London, Department of Informatics
在 nure.ua 的电子邮件经过验证
标题
引用次数
引用次数
年份
Testing of communication range in ZigBee technology
I Kuzminykh, A Snihurov, A Carlsson
2017 14th International Conference The Experience of Designing and …, 2017
732017
Measuring a LoRa Network: Performance, Possibilities and Limitations
A Carlsson, I Kuzminykh, R Franksson, A Liljegren
Internet of Things, Smart Spaces, and Next Generation Networks and Systems 1 …, 2018
682018
Information Security Risk Assessment.
I Kuzminykh, B Ghita, V Sokolov, T Bakhshi
Encyclopedia 602–617, 602–617, 2021
592021
Wireless sensors for brain activity—A survey
M TajDini, V Sokolov, I Kuzminykh, S Shiaeles, B Ghita
Electronics 9 (12), 2092, 2020
502020
Investigation of the IoT device lifetime with secure data transmission
I Kuzminykh, A Carlsson, M Yevdokymenko, V Sokolov
International Conference on Next Generation Wired/Wireless Networking, 16-27, 2019
352019
Increasing Teacher Competence in Cybersecurity Using the EU Security Frameworks
I Kuzminykh, M Yevdokymenko, O Yeremenko, O Lemeshko
International Journal of Modern Education and Computer Science (IJMECS) 13 …, 2021
272021
Scheme for dynamic channel allocation with interference reduction in wireless sensor network
IK Vladimir Sokolov, Anders Carlsson
4th International Scientific-Practical Conference Problems of …, 2017
262017
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
T Bakhshi, B Ghita, I Kuzminykh
Sensors 24 (2), 708, 2024
202024
Comparative analysis of cryptographic key management systems
I Kuzminykh, B Ghita, S Shiaeles
International Conference on Next Generation Wired/Wireless Networking, 80-94, 2020
192020
The relationship between student engagement and academic performance in online education
I Kuzminykh, B Ghita, H Xiao
2021 5th International Conference on E-Society, E-Education and E-Technology …, 2021
182021
Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
I Kuzminykh, A Carlsson
Internet of Things, Smart Spaces, and Next Generation Networks and Systems 1 …, 2018
182018
Brainwave-based authentication using features fusion
M TajDini, V Sokolov, I Kuzminykh, B Ghita
Computers & Security 129, 103198, 2023
162023
The challenges with Internet of Things security for business
I Kuzminykh, B Ghita, JM Such
Lecture Notes in Computer Science. International Conference on Next …, 2022
162022
Analysis of encryption key management systems: strengths, weaknesses, opportunities, threats
I Kuzminykh, M Yevdokymenko, D Ageyev
2020 IEEE International Conference on Problems of Infocommunications …, 2020
162020
Audio Interval Retrieval Using Convolutional Neural Networks
I Kuzminykh, D Shevchuk, S Shiaeles, B Ghita
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2020
142020
Analysis of security of rootkit detection methods
I Kuzminykh, M Yevdokymenko
2019 IEEE International Conference on Advanced Trends in Information Theory …, 2019
142019
Development of traffic light control algorithm in smart municipal network
I Kuzminvkh
2016 13th International Conference on Modern Problems of Radio Engineering …, 2016
132016
Using a machine learning model for malicious url type detection
SP Tung, KY Wong, I Kuzminykh, T Bakhshi, B Ghita
Lecture Notes in Computer Science, International Conference on Next …, 2022
112022
Encryption algorithms in IoT: Security vs lifetime
I Kuzminykh, M Yevdokymenko, V Sokolov
92021
Особливості створення віртуальної лабораторії кібербезпеки для дистанційного навчання
О Lemeshko, О Yeremenko, М Yevdokymenko, I Kuzminykh
New Collegium 3 (101), 41-45, 2020
82020
系统目前无法执行此操作,请稍后再试。
文章 1–20