default search action
Ihor Subach
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c11]Oleksandr Laptiev, Valentyn Sobchuk, Igor Subach, Andrii Barabash, Ivanna Salanda:
The Method of Detecting Radio Signals Using the Approximation of Spectral Function. IT&I Workshops 2022: 52-61 - [c10]Dmytro Lande, Olexander Puchkov, Ihor Subach:
Method of Detecting Cybersecurity Objects Based on OSINT Technology. ITS 2022: 115-124 - [c9]Ihor Subach, Dmytro Mogylevych, Artem Mykytiuk, Volodymyr Kubrak, Vitalii Fesokha:
Models of Fuzzy Identification of Cyber Incidents in Information and Communication Systems by Intelligent SIEM Systems. ITS 2022: 151-160 - 2021
- [c8]Ihor Subach, Dmytro Mogylevych, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev:
Design Methodology of Cybersecurity Situational Center. CPITS II (1) 2021: 79-88 - [c7]Borys Kredentser, Dmytro Mogylevych, Ihor Subach, Iryna Kononova:
Taking into Account a Priori Uncertainty in the Model of Maintenance of Objects with Time Redundanc. IT&I Workshops 2021: 180-193 - [c6]Ihor Subach, Vitalii Fesokha, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev:
Simulation Model of a Fuzzy Cyber Attack Detection System. ITS 2021: 92-101 - 2020
- [c5]Dmytro V. Lande, Andrei Snarskii, Oleh O. Dmytrenko, Igor Subach:
Relaxation time in complex network. ARES 2020: 99:1-99:6 - [c4]Oleksandr Puchkov, Igor Subach, Artem Zhylin, Vitaliy V. Tsyganok:
Criteria for Classification of Cyber-training and Analysis of Organizational and Technical Platforms for Their Conduct. IT&I 2020: 37-47 - [c3]Ihor Subach, Volodymyr Kubrak, Artem Mykytiuk, Stanislav Korotayev:
Rule-oriented Method of Cyber Incidents Detection by SIEM Based on Fuzzy Logical Inference. ITS 2020: 210-219
2010 – 2019
- 2019
- [c2]Igor Subach, Volodymyr Kubrak, Artem Mykytiuk:
Methodology of Rational Choice of Security Incident Management System for Building Operational Security Center. ITS 2019: 11-20 - 2018
- [c1]Igor Subach, Alexander Chauzov:
Метод розподілу таблиць реляційної бази даних рівного об'єму та різними ймовірностями звертання до них в інформаційно-обчислювальній мережі АСУ (The Method of Distribution of Tables of a Relational Database of Equal Volume and Different Probabilities of Solving them in the Information and Computing Network of Automated Control Systems). ITS 2018: 239-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-30 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint