default search action
Maksim Iavich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Maksim Iavich, Tamari Kuchukhidze:
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. Cryptogr. 8(2): 15 (2024) - [j6]Razvan Bocu, Maksim Iavich:
Enhanced detection of low-rate DDoS attack patterns using machine learning models. J. Netw. Comput. Appl. 227: 103903 (2024) - [c51]Vladimer Svanadze, Maksim Iavich, Sergiy Gnatyuk:
Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper). CPITS 2024: 497-504 - [c50]Vladimer Svanadze, Maksim Iavich:
Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet (short paper). CPITS 2024: 520-525 - [c49]Dmytro Proskurin, Maksim Iavich, Tetiana Okhrimenko, Okoro Chukwukaelonma, Tetiana Hryniuk:
Predicting pseudo-random number generator output with sequential analysis. CSDP 2024: 42-57 - [c48]Tea Tvalavadze, Ia Ghadua, Giorgi Kalandadze, Maksim Iavich:
Signature-based manual dating vs. neural network automation (short paper). CSDP 2024: 123-130 - 2023
- [j5]Roman Odarchenko, Maksim Iavich, Giorgi Iashvili, Solomiia Fedushko, Yuriy Syerov:
Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers. Big Data Cogn. Comput. 7(4): 169 (2023) - [j4]Razvan Bocu, Dorin Bocu, Maksim Iavich:
An Extended Review Concerning the Relevance of Deep Learning and Privacy Techniques for Data-Driven Soft Sensors. Sensors 23(1): 294 (2023) - [j3]Razvan Bocu, Maksim Iavich:
Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks. Symmetry 15(1): 110 (2023) - [j2]Lev Gorlov, Maksim Iavich, Razvan Bocu:
Linear Layer Architecture Based on Cyclic Shift and XOR. Symmetry 15(8): 1496 (2023) - [j1]Maksim Iavich, Tamari Kuchukhidze, Razvan Bocu:
A Post-Quantum Digital Signature Using Verkle Trees and Lattices. Symmetry 15(12): 2165 (2023) - [c47]Maksim Iavich, Tamari Kuchukhidze, Razvan Bocu:
A Post-quantum Cryptosystem with a Hybrid Quantum Random Number Generator. AINA (2) 2023: 367-378 - [c46]Maksim Iavich, Giorgi Akhalaia, Razvan Bocu:
Device Tracking Threats in 5G Network. AINA (3) 2023: 480-489 - [c45]Maksim Iavich, Tamari Kuchukhidze, Tetiana Okhrimenko:
Verkle Tree-based Post-Quantum Digital Signature Scheme using Stateless Updatable Vector Commitment. CPITS II 2023: 157-166 - [c44]Giorgi Akhalaia, Maksim Iavich, Giorgi Iashvili, Dmytro Prysiazhnyy, Tetiana Smirnova:
Secure Encrypted Connection on Georgian Website (short paper). CPITS II 2023: 313-320 - [c43]Avtandil Gagnidze, Maksim Iavich, Giorgi Iashvili, Dali Magraqvelidze, Tetiana Okhrimenko:
Correlation of Bitcoin Price and S&P 500 Company Index (short paper). CQPC 2023: 72-77 - [c42]Dmytro Proskurin, Sergiy Gnatyuk, Tetiana Okhrimenko, Maksim Iavich:
ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security. IDAACS 2023: 1025-1030 - [c41]Maksim Iavich, Tamari Kuchukhidze:
Digital Signature Design Using Verkle Tree. IVUS 2023: 83-91 - [c40]Giorgi Iashvili, Maksim Iavich:
Enhancing Cyber Intelligence Capabilities through Process Automation: Advantages and Opportunities. IVUS 2023: 92-101 - [c39]Giorgi Akhalaia, Maksim Iavich:
High-Band Related Threats in 5G Network. IVUS 2023: 132-140 - [c38]Maksim Iavich, Sergei Simonov:
Utilizing the «MouseJack» Vulnerability in Physical Assessments. IVUS 2023: 364-371 - 2022
- [c37]Razvan Bocu, Maksim Iavich:
Enhanced Autonomous Driving Through Improved 3D Objects Detection. AINA (1) 2022: 56-66 - [c36]Maksim Iavich, Razvan Bocu, Avtandil Gagnidze:
Real Time Self-developing Cybersecurity Function for 5G. AINA (3) 2022: 380-387 - [c35]Nata Bibiluri, Gia Surguladze, Giorgi Tsaava, Malkhaz Bibiluri, Maksim Iavich:
Global processes of economy's sustainable development, information society, systems and technologies. CMiGIN 2022: 224-234 - [c34]Maksim Iavich, Giorgi Iashvili, Roman Odarchenko, Sergiy Gnatyuk, Avtandil Gagnidze:
Developing Security Recommender System Using Content-Based Filtering Mechanisms. ITEST 2022: 619-634 - [c33]Maksim Iavich, Sergiy Gnatyuk, Giorgi Iashvili, Roman Odarchenko, Sergei Simonov:
5G Security Function and Its Testing Environment. ITEST 2022: 656-678 - [c32]Yury Palekha, Nataliia Zozulia, Nataliia Moskovchenko, Volodymyr Sadovenko, Nataliia Vovk, Maksim Iavich:
Technological Processes of Working with Documented Information in the Organization as an Indicator of Corporate Information Subculture. SCIA 2022: 229-240 - 2021
- [c31]Razvan Bocu, Maksim Iavich, Sabin Tabirca:
A Real-Time Intrusion Detection System for Software Defined 5G Networks. AINA (3) 2021: 436-446 - [c30]Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Razvan Bocu, Sergei Simonov:
The Novel System of Attacks Detection in 5G. AINA (2) 2021: 580-591 - [c29]Maksim Iavich, Giorgi Iashvili, Zhadyra Avkurova, Serhii Dorozhynskyi, Andriy Fesenko:
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment. CPITS II (1) 2021: 139-149 - [c28]Maksim Iavich, Dinara Ospanova, Ketevan Grdzelidze, Rashit Brzhanov, Yuliia Polishchuk:
Advanced Data Security and Privacy Ensuring Methods in 5G Era. CPITS II (1) 2021: 160-169 - [c27]Razvan Bocu, Maksim Iavich, Sergiy Gnatyuk, Dinara Ospanova, Yuliia Sotnichenko:
Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices. CPITS I 2021: 164-174 - [c26]Sergiy Gnatyuk, Rat Berdibayev, Tetiana Smirnova, Zhadyra Avkurova, Maksim Iavich:
Cloud-Based Cyber Incidents Response System and Software Tools. ICIST 2021: 169-184 - [c25]Maksim Iavich, Giorgi Iashvili, Sergiy Gnatyuk, Andrii Tolbatov, Lela Mirtskhulava:
Efficient and Secure Digital Signature Scheme for Post Quantum Epoch. ICIST 2021: 185-193 - [c24]Giorgi Iashvili, Maksim Iavich, Sergiy Gnatyuk, Roman Odarchenko, Sergei Simonov:
Simulated Test Laboratory for 5G Test Patterns. IDAACS 2021: 521-526 - [c23]Giorgi Iashvili, Maksim Iavich, Razvan Bocu, Roman Odarchenko, Sergiy Gnatyuk:
Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks. IDAACS 2021: 861-864 - [c22]Giorgi Akhalaia, Maksim Iavich:
Novel Architecture of 5G Network. IVUS 2021: 11-17 - [c21]Maksim Iavich, Avtandil Gagnidze, Giorgi Iashvili, Sergei Simonov, Razvan Bocu:
Novel Intrusion Detection System for 5G. IVUS 2021: 27-34 - [c20]Giorgi Labadze, Maksim Iavich, Giorgi Iashvili, Avtandil Gagnidze, Sergiy Gnatyuk:
Post-Quantum Digital Signature Scheme with BB84 Protocol. IVUS 2021: 35-44 - [c19]Tatiana Babenko, Hryhorii Hnatiienko, Vira Ignisca, Maksim Iavich:
Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems. IVUS 2021: 92-101 - 2020
- [c18]Oleksandr Turovsky, Yurii Khlaponin, Muhi-Aldin Hassan Mohamed, Tetiana Okhrimenko, Iuliia Goncharenko, Maksim Iavich:
Combined System of Phase Synchronization with Increased Astatism order in Frequency Monitoring Mode. COAPSN 2020: 53-62 - [c17]Zhanna Myna, Vasyl Banakh, Andriy Nahirnyak, Maksim Iavich:
Analysis of the Essence of Social Networks as a Tool for Mediatization of the Historical and Cultural Heritage of Museums. COAPSN 2020: 199-213 - [c16]Elza Jintcharadze, Maksim Iavich:
Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. EWDTS 2020: 1-5 - [c15]Sergiy Gnatyuk, Vasyl Kinzeryavyy, Maksim Iavich, Roman Odarchenko, Rat Berdibayev, Yuliia Burmak:
Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher. ICST 2020: 202-213 - [c14]Sergiy Gnatyuk, Maksim Iavich, Vasyl Kinzeryavyy, Tetyana Okhrimenko, Yuliia Burmak, Iuliia Goncharenko:
Improved Secure Stream Cipher for Cloud Computing. ICTERI Workshops 2020: 183-197 - [c13]Maksym Zaliskyi, Roman Odarchenko, Yuliia Petrova, Maksim Iavich, Irakli Pirtskhalava:
Mathematical Model Building for COVID-19 Diseases Data in European Countries. IDDM 2020: 197-208 - [c12]Giorgi Iashvili, Maksim Iavich, Avtandil Gagnidze, Sergiy Gnatyuk:
Increasing Usability of TLS Certificate Generation Process Using Secure Design. IVUS 2020: 35-41 - [c11]Maksim Iavich, Razvan Bocu, Arturo Arakelian, Giorgi Iashvili:
Post-Quantum Digital Signatures with Attenuated Pulse Generator. IVUS 2020: 42-45
2010 – 2019
- 2019
- [c10]Nataliia Kraus, Nataliia Andrusiak, Alina Savchenko, Maksim Iavich:
Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy. CMiGIN 2019: 80-89 - [c9]Igor Zhukov, Nickolay Pechurin, Lyudmila Kondratova, Maksim Iavich, Kalyy Yerzhanov:
Increasing the Accuracy of the Information Load Annual Growth Evaluation on the Internet of Things. CMiGIN 2019: 580-593 - [c8]Svitlana Kazmirchuk, Anna Ilyenko, Sergii Ilyenko, Yakovenko Olesya, Marharyta Herasymenko, Maksim Iavich:
Improved Gentry's Fully Homomorphic Encryption Scheme: Design, Implementation and Performance Evaluation. CybHyg 2019: 72-83 - [c7]Olena Kozhokhina, Olga Shcherbyna, Oleksii Chuzha, Serhii Yehorov, Maksim Iavich, Nikolay Churkin:
Informational Technology for the Improvement of Flight Zone Security. CybHyg 2019: 262-275 - [c6]Maksim Iavich, Arturo Arakelian, Giorgi Iashvili, Dali Magrakvelidze, Tetiana Okhrimenko:
Improvement of Implementation of Merkle Crypto System. CybHyg 2019: 536-545 - [c5]Zhengbing Hu, Sergiy Gnatyuk, Tetyana Okhrimenko, Vasyl Kinzeryavyy, Maksim Iavich, Khalicha Yubuzova:
High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits. ICTERI Workshops 2019: 810-821 - [c4]Maksim Iavich, Avtandil Gagnidze, Giorgi Iashvili, Sergiy Gnatyuk, Vira Vialkova:
Lattice based merkle. IVUS 2019: 13-16 - [c3]Richard Megrelishvili, Melkisadeg Jinjikhadze, Avtandil Gagnidze, Maksim Iavich, Giorgi Iashvili:
Generation of high order primitive matrix elements for post-quantum key exchange protocol. IVUS 2019: 48-51 - [c2]Elza Jintcharadze, Maksim Iavich:
Public-Key hybrid cryptosystem based on Blowfish and RSA. IVUS 2019: 52-55 - 2018
- [c1]Sergiy Gnatyuk, Vasyl Kinzeryavyy, Maksim Iavich, Dmytro Prysiazhnyi, Khalicha Yubuzova:
High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks. ICTERI Workshops 2018: 657-668
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint