-
Jaatun, L. A., Sørlien, S. M., Borgaonkar, R., Taylor, S., & Jaatun, M. G. (2023). Software Bill of Materials in Critical Infrastructure. In 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) (pp. 319-324). IEEE. https://doi.org/10.1109/CloudCom59040.2023.00059
- Taylor, S., Gilje Jaatun, M., Mc Gibney, A., Seidl, R., Hrynchenko, P., Prosvirin, D., & Mancilla, R. (2024). A framework addressing challenges in cybersecurity testing of IoT ecosystems and components. In Proceedings of the 9th International Conference on Internet of Things, Big Data and Security (IoTBDS) (pp. 226-234). SciTePress. https://doi.org/10.5220/0012676300003705
- Holmdin, N. ., & Jaatun, M. G. . (2024). Fuzz Testing of a Wireless Residential Gateway. Norsk IKT-Konferanse for Forskning Og Utdanning, (3).Retrieved from https://www.ntnu.no/ojs/index.php/nikt/article/view/6241
- Lytvyn, V., Bakurova, A., Zaritskyi, O., Gritskevich, A., Hrynchenko, P., Tereschenko, E., & Shyrokorad, D. (2024). Fuzzy logic-based methodology for building access control systems based on fuzzy logic. In Proceedings of the 6th International Workshop on Modern Data Science Technologies (MoDaST 2024) (Vol. 3723, pp. 104-120). CEUR-WS. Retrieved from https://ceur-ws.org/Vol-3723/
- Bakurova, A. V., Zaritskyi, O. V., Gritskevich, A. A., Hrynchenko, P. V., Tereschenko, E. V., & Shyrokorad, D. V. (2024). Assessment of the vulnerability of the information system based on fuzzy mathematics. In Proceedings of the Twenty Sixth International Scientific and Practical Seminar "Combinatorial Configurations and Their Applications," dedicated to the memory of Professor G. A. Dontsia (pp. 19–24). (ISBN 978-617-7942-27-5).rg/Vol-3723/
- Zaritskyi, O. (2025). Expert system for assessing the status of the access control system to the information environment of a Smart factory. Problems of Control and Informatics, Artificial Intelligence Systems. (ISSN 2786-6491).
- Bakurova, A. V., Zaritskyi, O. V., Gritskevich, A. A., Hrynchenko, P. V., Tereschenko, E. V., & Shyrokorad, D. V. (2024). Assessment of the consequences of vulnerabilities in network systems. In Proceedings of the XII International Scientific and Practical Conference: Current Problems and Achievements in the Field of Radio Technology of Telecommunications and Information Technologies (pp. 429–432). Zaporizhzhia. https://zp.edu.ua/conference-2024-1-4
- Gritskevich, A. A. (2024). Determining anomalous behavior of entities in large IT structures. In Proceedings of the XII International Scientific and Practical Conference: Current Problems and Achievements in the Field of Radio Technology of Telecommunications and Information Technologies (pp. 433–437). Zaporizhzhia. https://zp.edu.ua/conference-2024-1-4
- Taylor, S., Götze, N., Kuhr, J., Abendroth, J., Zaritskyi, O., Mancilla, R., Wenning, B.-L., Kuruppuarachchi, P., Omerovic, A., Borgaonkar, R., Skytterholm, A. N., Mpantis, A., Triantafyllou, G., & Garcia Perales, O. (2025). Cybersecurity indicators within a cybersecurity testing and monitoring framework. Accepted for presentation at IoTBDS 2025.