Author of the publication

Phishing Attacks Detection.

, , and . IT&I Workshops, volume 3384 of CEUR Workshop Proceedings, page 193-201. CEUR-WS.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Toliupa, Serhii
add a person with the name Toliupa, Serhii
 

Other publications of authors with the same name

Diceware Password Generation Algorithm Modification based on Pseudo-Random Sequences., , , , and . CPITS II (2), volume 3188 of CEUR Workshop Proceedings, page 167-176. CEUR-WS.org, (2021)Simulated Datasets Generator for Testing Data Analytics Methods., , , and . DSMSI, volume 3687 of CEUR Workshop Proceedings, page 11-24. CEUR-WS.org, (2023)RF Signals Encryption with AES in WDID., , , and . IT&I Workshops, volume 2845 of CEUR Workshop Proceedings, page 96-105. CEUR-WS.org, (2020)The Method for Determining the Degree of Suspiciousness of a Phishing Url., , , and . IT&I Workshops, volume 3646 of CEUR Workshop Proceedings, page 239-247. CEUR-WS.org, (2023)Method for Identification of Critical Information Infrastructure Objects of the State., , and . IT&I Workshops, volume 3179 of CEUR Workshop Proceedings, page 262-271. CEUR-WS.org, (2021)Realization of LEO-Systems with Architecture of Distributed Satellites for 5G/IoT., , , , , and . CMiGIN, volume 2588 of CEUR Workshop Proceedings, page 604-613. CEUR-WS.org, (2019)Managing the Security of the Critical Infrastructure Information Network., , , , and . CPITS II, volume 3550 of CEUR Workshop Proceedings, page 131-142. CEUR-WS.org, (2023)An Approach to Restore the Proper Functioning of Embedded Systems Due to Cyber Threats., , , , and . IT&I, volume 3624 of CEUR Workshop Proceedings, page 301-316. CEUR-WS.org, (2023)Data Processing Centre's Cyberattack Protection Directions on the Base of Neural Network Algorithms., , , , and . IT&I, volume 3347 of CEUR Workshop Proceedings, page 212-221. CEUR-WS.org, (2022)Detection of abnormal traffic and network intrusions based on multiple fuzzy rules., , , , , and . KES, volume 207 of Procedia Computer Science, page 44-53. Elsevier, (2022)