Serhii Yevseiev

Position: Professor, Cybersecurity Department

Scientific degree: Doctor of Technical Sciences

Academic status: Professor

Email: serhii.yevseiev@lnu.edu.ua

Google Scholar profile: scholar.google.com.ua

ORCID profile: orcid.org

Scopus profile: www.scopus.com

Facebook profile: www.facebook.com

LinkedIn profile: www.linkedin.com

Research interests

Post-quantum cryptology, multi-loop information protection systems, cyber-physical and socio-cyber-physical systems.

Publications

More than 300 scientific works (including 17 monographs, of which 9 are collective, 63 articles in foreign publications and specialized publications of Ukraine, of which 61 are in the scientometric database Scopus, 31 textbooks, of which 4 are stamped by the Ministry of Education and Science of Ukraine).  44 utility model patents.

Teaching aids:
Cyber ​​security: modern protection technologies. Study guide for students of higher educational institutions. / S.E. Ostapov, S.P. Yevseev, O.G. King. – Lviv: “New World-2000”, 2020. – 678 p.

Ethernet technology: laboratory workshop / M. O. Bilova, S. P. Yevseev, O. S. Zhuchenko, I. S. Ivanchenko, O. V. Shmatko. – Lviv: “New World-2000”, 2020. – 196 p.

S. P. Yevseev Laboratory workshop on the basics of cryptographic protection [Electronic resource] : study guide / S. P. Yevseev, O. V. Milov, O. G. Korol. – Kharkiv: KHNEU named after S. Kuznetsa, 2020. – 222 p. 

Yevseyev S.P. CYBER SECURITY: CRYPTOGRAPHY WITH PYTHON: training. manual / S.P. Yevseev, O.V. Shmatko, O.H. Korol – Kharkiv: “New World – 2000” Publishing House, 2021. – 120 p.

CYBER SECURITY: WEB technologies [Electronic resource]: Training and reference manual / S.P. Yevseev, A.M. Tkachev, V.O. Alexiev, Yu.M. Ryabukha – Kharkiv: KHNEU named after S. Kuznetsia, – Lviv: “Novyi Svit-2000” Publishing House, 2021. – 390 p.

Yevseev S.P. Cyber ​​security: basics of coding and cryptography/ S.P. Yevseev, O.V. Milov, S.E. Ostapov, O.V. Severinov. – Kharkiv: Ed. “New World-2000”, 2023. – 657 p.
Digital circuitry and architecture of microprocessors: a study guide / Yevseev S.P., Zhenyuk N.V., Okhrymenko M.Yu. etc. – Kharkiv, – Lviv: Publishing House of PP “Noviy Svit – 2000”, 2023. -513 p. 

Computer networks: [Book 1. Technologies of computer networks]: Study guide / S.P. Yevseev, N.V. Zhenyuk, M.Yu Tolkachov, etc. – Kharkiv, – Lviv: “New World – 2000” Publishing House, 2024. – 471 p.

Computer networks. [Book 2. Computer architecture]: Study guide / Yevseev S.P., Zhenyuk N.V., Tolkachov M.Yu. etc. – Kharkiv, – Lviv: Publishing House of PP “Noviy Svit – 2000”, 2024. – 346 p. 

Articles, monographs:

Development of Niederreiter hybrid crypto-code structure on flawed codes. Eastern-European Journal of Enterprise Technologies, 1/9 (97). p. 27 –37, 2019.

Development of a methodology for building a security information system in the corporate research and education system in the context of university autonomy. Eastern-European Journal of Enterprise Technologies. 2019. 3/9(99). р. 49–63.

Development of the interacting agents behavior scenario in the cyber security system. Eastern-European Journal of Enterprise Technologies.  2019. 5/9 (101). р. 46–57. 

Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systems. “EUREKA: Physical Sciences and Engineering”, № 1. – 2020. р. 48–55.

Development and analysis of game the theoretical models of security systems agents interaction. Eastern-European Journal of Enterprise Technologies . 2020. 2/4(104). р. 15–29. 

Using the Flawed Codes In Niederreiter Crypto-Code Structure // Short Paper Proceedings of the 1st International Conference on Intellectual Systems and Information Technologies (ISIT 2019), Odessa, Ukraine, August 19–24, 2019. P. 17–19.

“Development of an advanced method of video information resource compression in navigation and traffic control systems”. “EUREKA: Physical Sciences and Engineering”, № 5. – 2020. P. 31–42.

Development of Methods for Improving Crypto Transformations in the Block-Symmetric Code. 5th IEEE International Symposium on Smart and Wireless Systems Within the INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS. 17–18 September 2020. P.130–138.

Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum period. International Journal of Advanced Trends in Computer Science and Engineering. Volume 9, No.5, September – October 2020. P. 8725–8729.

Development of methodological principles for the construction of a corporate information educational system of innovative-active University in the framework of anticorruption activities. Eastern-European Journal of Enterprise Technologies. 2020. 5/2(107). р. 6–28.

Modeling the protection of personal data from trust and the amount of information on social. “EUREKA: Physical Sciences and Engineering”, № 1. – 2021. Р. 24–31.

Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency. Eastern-European Journal of Enterprise Technologies. 2021. 1/2 (109). р. 14–23.

Development of an optimization method for measuring the doppler frequency of a bucket with account for the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies. 2021. 2/9 (110). P. 6–15.

Synergy of building cybersecurity systems: monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. – Kharkiv: PC TECHNOLOGY CENTER, 2021. – 188 p.

Development of conception for building a critical infrastructure facilities security system. Eastern-European Journal of Enterprise Technologies. 2021. 3/9

Security Analysis Models for Multimedia Information Resources in Social Networks. Cybersecurity Providing in Information and Telecommunication Systems, January 28, 2021, Kyiv, Ukraine. Р. 60–67.

Development of a method for estimating the effect of  ransformation of the normalized frequency mismatch function of a coherent bundle of radio pulses on the quality of radar frequency resolution. Eastern-European Journal of Enterprise Technologies. 2021. 4/4 (112). P. 13–22.

Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Eastern-European Journal of Enterprise Technologies. 2021. 5/9 (113). P. 30–47.

The method of discretization signals to minimize the fallibility of information recovery. International Journal of Communication Networks and Information Security (IJCNIS). Vol 13, No 3 (2021). рр340-348.

Development of a method for assessing forecast of social impact in regional communities. Eastern-European Journal of Enterprise Technologies. 2021. 6/2 (114). P. 30–47.

Research of collision properties of the modified UMAC algorithm on crypto-code constructions. “EUREKA: Physical Sciences and Engineering”, № 1. – 2022. Р. 34–44.

Development of a modification of the method for constructing energy-efficient sensor networks using static and dynamic sensors. Eastern-European Journal of Enterprise Technologies. 2022. 1/9 (115). P. 15–23.

Development of crypto code structures on LDPC-codes. Eastern-European Journal of Enterprise Technologies. 2022. 2/9 (116). P. 44–59.

Socio-Cyber-Physical Systems Security Concept. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. June 9-11, 2022, Ankara, Turkey, 836 p.

Measuring Signals Synthesis Method on the Basis of Triangular Time-Pulse Modulation for Control of Radiotechnic Systems Technical Condition. Concept. 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications. June 9-11, 2022, Ankara, Turkey, P. 831

Development of a method for determining the indicators of manipulation based on morphological synthesis. Eastern-European Journal of Enterprise Technologies. 2022. 3/9 (117). P. 22–35.

Modeling of security systems for critical infrastructure facilities: monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych and others. – Kharkiv: PC TECHNOLOGY CENTER, – 196 p.

Development of concepts for the cyber security metrics classification. Eastern-European Journal of Enterprise Technologies. 4/4 (118). 2022. 6–18.

Solving the Problem of Convergence of the Results of Analog Signals Conversion in the Process of Aircraft Control. 2022 IEEE Third International Conference on SYSTEM ANALYSIS & INTELLIGENT COMPUTING (SAIC), 04-07 Oktober, Kyiv, Ukraine. p. 118-124

Development of a hardware cryptosystem based on a random number generator with two types of entropy sources. Eastern-European Journal of Enterprise Technologies. 2022. 5/9 (119). P. 6–16.

Development of the concept for determining the level of critical business processes security. Eastern-European Journal of Enterprise Technologies. 2023. 1/9 (121). P. 21–40.

Models of socio-cyber-physical systems security: monograph / S. Yevseiev, Yu. Khokhlachova, S. Ostapov, O. Laptiev and others. – Kharkiv: PC TECHNOLOGY CENTER, 2023. – 168 p.

Development of an errors correction method using perfect binary arrays. Eastern-European Journal of Enterprise Technologies. 2023. 4/9 (124). 45–53.

Development of a multi-loop security system of information interactions in socio-cyberphysical systems. Eastern-European Journal of Enterprise Technologies. 2023. 5/9 (125). 53–74.

Method of assessment of frequency resolution for aircraft. Eastern-European Journal of Enterprise Technologies, 2023, 2/9(122), Р.34–45

Development of an improved SSL/TLS protocol using post-quantum algorithms. Eastern-European Journal of Enterprise Technologies. 2023. 3/9 (123). P. 33–47

Implementation of Information and Communication Technologies in the Educational Process HORA 2023 – 2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings, 2023

Phase-Modulated Signals Synthesis Method to Control Information Transmission Channels. 2023 IEEE 4th KhPI Week on Advanced Technology (KhPIWeek).

Method for Assessing Meter Error Characteristics of Random Signals. 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).

Development of a Sociocyberphysical Systems Cyber Threats Classifier. 2023 7th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT).

Detecting Deepfake Modifications of Biometric Images using Neural Networks. CPITS-2024: Cybersecurity Providing in Information and Telecommunication Systems, February 28, 2024, Kyiv, Ukraine. P.391–397.

Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection. Eastern-European Journal of Enterprise Technologies. 2/9 (128). 2024. Р. 36–43.

Entropy Method for Assessing the Strength of Encryption Algorithms. 979-8-3503-9463-4/24/$31.00 ©2024 IEEE

Development of a model of the information and analytical system for making decisions on detecting failures of information transmission channels. Eastern-European Journal of Enterprise Technologies. 3/9 (129) 2024. Р. 28–36.

Model basis for cybersecurity of socio-cyberphysical systems //Baltic journal of modern computing. – 2024. – Т. 12. – №. 2. – С. 125-149.

Biography

Education and professional activity:
2022 – to the present time – the head of the cyber security department of KhPI National Technical University.
2020 – to the present time – the title of professor of the Department of Cyber ​​Security and Information Technologies.
2018 – awarded the academic title of Doctor of Technical Sciences in the specialty “Cyber ​​Security”.
2013 – awarded the academic title of associate professor of the Department of Information Systems.
2010 – awarded the academic title of senior researcher in the specialty “Information Protection Systems”.
2006 – awarded the scientific degree of candidate of technical sciences in the specialty 253 Military management (by types of Armed Forces) (20.02.12 Military cybernetics, control systems and communication), the topic “Method of increasing the secrecy of data transmission in ACS based on the use of elliptical codes “.
2002 – received a diploma in the specialty “Organization of technical support of troops (by types and types of troops and forces)” and obtained the qualification of master of military administration, officer of military administration of operational-tactical level.
1991 – received a specialist diploma in the specialty “Automated control systems” Perm Higher Military Command and Engineering Red Banner School of Missile Forces named after Marshal of the Soviet Union V.I. Chuikov, 2002.

Сертифікати

Cisco certificates:

  • CCNA R&S: Introduction to Networks;
  • CCNA R&S: Routing and Switching Essentials;
  • CCNA R&S: Scaling Networks;
  • CCNA R&S: Connecting Networks.

Teaching materials

Schedule