Personal information

Verified email domains

Web Security, Cyber Security, IoT
Ukraine, Sweden

Activities

Employment (8)

King's College London: London, GB

Employment
Source: check_circle
King's College London

King's College London : London, GB

2020-11-01 to present | Lecturer (Informatics)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Kharkiv National University of Radioelectronics: Kharkiv, UA

2015 to present | Associate Professor (Infocommunications)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Blekinge Tekniska Högskola: Karlskrona, SE

2019-02-01 to 2020-03-01 | Senior Lecturer (Computer Science)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Blekinge Tekniska Högskola: Karlskrona, SE

2017 to 2018-12-31 | PostDoc (Computer Science)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Blekinge Tekniska Högskola: Karlskrona, SE

2016-11 to 2016-12 | Visiting Teacher (Computer Science)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Kharkiv National University of Radioelectronics: Kharkiv, UA

2014 to 2015 | Senior Lecture (Telecommunications)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Kharkiv National University of Radioelectronics: Kharkiv, UA

2010 to 2014 | Assistant Professor (Telecommunications)
Employment
Source: Self-asserted source
Ievgeniia Kuzminykh

Education and qualifications (3)

Kharkiv National University of Radioelectronics: Kharkiv, UA

2006 to 2013 | PhD (Telecommunications)
Education
Source: Self-asserted source
Ievgeniia Kuzminykh

Kharkiv National University of Radio Electronics: Kharkiv, UA

2005 to 2006 | M.S. (Telecommunication Systems)
Education
Source: Self-asserted source
Ievgeniia Kuzminykh

Kharkiv National University of Radio Electronics: Kharkiv, UA

2001-09-01 to 2005-06-31 | Bs (Telecommunication Systems)
Education
Source: Self-asserted source
Ievgeniia Kuzminykh

Works (37)

Understanding the skills gap between higher education and industry in the UK in artificial intelligence sector

Industry and Higher Education
2024-09-03 | Journal article
Contributors: Khushi Jaiswal; Ievgeniia Kuzminykh; Sanjay Modgil
Source: check_circle
Crossref

Analysis of Student Preference to Group Work Assessment in Cybersecurity Courses

2nd International Workshop on CyberSecurity Education for Industry and Academia (CSE4IA 2024), Genova, Italy
2024-06 | Conference paper | Author
SOURCE-WORK-ID:

ebedee5f-7873-4f57-84fc-a645a92213ef

Contributors: Dr Hannan Xiao; Joseph Spring; Ievgeniia Kuzminykh
Source: check_circle
King's College London

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

SENSORS
2024-01 | Journal article | Author
SOURCE-WORK-ID:

6c60d456-75c6-43c0-8849-2f92317c045e

EID:

2-s2.0-85183415883

Contributors: Taimur Bakhshi; Bogdan Ghita; Ievgeniia Kuzminykh
Source: check_circle
King's College London
grade
Preferred source (of 3)‎

SAFE

2023 15th International Conference on Innovations in Information Technology, IIT 2023
2023 | Book chapter | Author
SOURCE-WORK-ID:

03ec43dd-2e95-4fc6-b937-8d70359a6152

EID:

2-s2.0-85182946412

Part of ISBN: 9798350382396
Contributors: Taimur Bakhshi; Bogdan Ghita; Ievgeniia Kuzminykh
Source: check_circle
King's College London

Exploitation Techniques of IoST Vulnerabilities in Air-Gapped Networks and Security Measures—A Systematic Review

Signals
2023-12 | Journal article | Author
SOURCE-WORK-ID:

c43ec17e-4bef-40f6-8fa8-35b46e8f3d29

EID:

2-s2.0-85180657206

Contributors: Razi Hamada; Ievgeniia Kuzminykh
Source: check_circle
King's College London

Performance Analysis of Free Text Keystroke Authentication Using XGBoost

Advances in Computer Science for Engineering and Education VI
2023-08-19 | Book chapter | Author
SOURCE-WORK-ID:

036ffba2-b05b-444d-968d-63340457791f

EID:

2-s2.0-85168992630

Part of ISBN: 9783031361180
Part of ISBN: 9783031361173
Contributors: Ievgeniia Kuzminykh; Saransh Mathur; Bogdan Ghita
Source: check_circle
King's College London

Evaluating Learning Algorithms for Keystroke Based User Authentication

2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 4/07/2023
2023-07-04 | Conference paper | Author
SOURCE-WORK-ID:

d9bfae67-ff60-443a-9bef-9138f3afab63

EID:

2-s2.0-85179007802

Contributors: Tianqing Xi; Ievgeniia Kuzminykh; Bogdan Ghita; Taimur Bakhshi
Source: check_circle
King's College London

Work-in-Progress: Security of Public-Key Schemes in the Quantum Computing Era – A Literature Review

2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 4/07/2023
2023-07-04 | Conference paper | Author
SOURCE-WORK-ID:

035aa020-7775-4181-a4a5-67a0ad8ebd3f

EID:

2-s2.0-85178999946

Contributors: Boriss Redkins; Ievgeniia Kuzminykh; Bogdan Ghita
Source: check_circle
King's College London

Brainwave-based authentication using features fusion

Computers & Security
2023-06 | Journal article
Contributors: Mahyar TajDini; Volodymyr Sokolov; Ievgeniia Kuzminykh; Bogdan Ghita
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Inclusive Group Work Assessment for Cybersecurity

2023-06-29 | Conference paper
Contributors: Hannan Xiao; Joseph Spring; Ievgeniia Kuzminykh; Jacopo Cortellazzi
Source: check_circle
Crossref

The Challenges with Internet of Things Security for Business

2022 | Book chapter
Contributors: Ievgeniia Kuzminykh; Bogdan Ghita; Jose M. Such
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Using a Machine Learning Model for Malicious URL Type Detection

2022 | Book chapter
Contributors: Suet Ping Tung; Ka Yan Wong; Ievgeniia Kuzminykh; Taimur Bakhshi; Bogdan Ghita
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning

CEUR Workshop proceedings
2021 | Conference paper | Author
SOURCE-WORK-ID:

4dbf1b2a-e822-43d1-8659-cff462f20b36

EID:

2-s2.0-85137140274

Contributors: Oleksandr Lemeshko; Oleksandra Yeremenko; Maryna Yevdokymenko; Ievgeniia Kuzminykh; Amal Mersni
Source: check_circle
King's College London

Investigating Threshold Concept and Troublesome Knowledge in Cyber Security

2021 1st Conference on Online Teaching for Mobile Education, OT4ME 2021
2021 | Conference paper | Author
SOURCE-WORK-ID:

36f2bfb7-4e32-482a-92f7-250fd9a80d36

EID:

2-s2.0-85123842320

Part of ISBN: 9781665428149
Contributors: Ievgeniia Kuzminykh; Bogdan Ghita; Dr Hannan Xiao; Maryna Yevdokymenko; Oleksandra Yeremenko
Source: check_circle
King's College London

Increasing teacher competence in cybersecurity using the eu security frameworks

International Journal of Modern Education and Computer Science
2021-12 | Journal article | Author
SOURCE-WORK-ID:

acf2da66-ab9c-4960-921f-8d4b39663134

EID:

2-s2.0-85120407187

Contributors: Ievgeniia Kuzminykh; Maryna Yevdokymenko; Oleksandra Yeremenko; Oleksandr Lemeshko
Source: check_circle
King's College London

Analysis of Encryption Key Management Systems

2020 IEEE International Conference on Problems of Infocommunications Science and Technology, PIC S and T 2020 - Proceedings
2021-10-06 | Conference paper | Author
SOURCE-WORK-ID:

e6217ee0-cbdb-4c73-b58c-bda4ef67ba34

EID:

2-s2.0-85114397595

Part of ISBN: 9781728191775
Contributors: Ievgeniia Kuzminykh; Maryna Yevdokymenko; Dmytro Ageyev
Source: check_circle
King's College London

The Relationship between Student Engagement and Academic Performance in Online Education

ICSET 2021 - 2021 5th International Conference on E-Society, E-Education and E-Technology
2021-08-21 | Conference paper | Author
SOURCE-WORK-ID:

39bb4f6d-6a12-4f2c-a76f-e6770d8f9982

EID:

2-s2.0-85122286089

Part of ISBN: 9781450390156
Contributors: Ievgeniia Kuzminykh; Bogdan Ghita; Dr Hannan Xiao
Source: check_circle
King's College London

Information Security Risk Assessment

Encyclopedia
2021-07-24 | Journal article
Contributors: Ievgeniia Kuzminykh; Bogdan Ghita; Volodymyr Sokolov; Taimur Bakhshi
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Audio Interval Retrieval Using Convolutional Neural Networks

2020 | Book chapter
Contributors: Ievgeniia Kuzminykh; Dan Shevchuk; Stavros Shiaeles; Bogdan Ghita
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Comparative Analysis of Cryptographic Key Management Systems

2020 | Book chapter
Contributors: Ievgeniia Kuzminykh; Bogdan Ghita; Stavros Shiaeles
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Wireless Sensors for Brain Activity—A Survey

Electronics
2020-12-08 | Journal article
Contributors: Mahyar TajDini; Volodymyr Sokolov; Ievgeniia Kuzminykh; Stavros Shiaeles; Bogdan Ghita
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Cyber resilience and fault tolerance of artificial intelligence systems: EU standards, guidelines, and reports

2020 Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS 2020
2020-07 | Conference paper | Author
SOURCE-WORK-ID:

8766c0d0-2579-4b74-9322-c17c7a02f548

Part of ISBN:

16130073

Contributors: Oleksandr Lemeshko; Maryna Yevdokymenko; Oleksandra Yeremenko; Ievgeniia Kuzminykh
Source: check_circle
King's College London

A performance evaluation of sensor nodes in the home automation system based on arduino

A performance evaluation of sensor nodes in the home automation system based on arduino
2019 | Conference paper | Author
SOURCE-WORK-ID:

9c69fe61-e403-41cf-bf5e-29695db98c6b

EID:

2-s2.0-85083647539

Part of ISBN: 978-172814184-8
Contributors: Ievgeniia Kuzminykh; Maryna Yevdokymenko; Anders Carlsson
Source: check_circle
King's College London

Analysis of Security of Rootkit Detection Methods

2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT)
2019 | Other
Contributors: Ievgeniia Kuzminykh; Maryna Yevdokymenko
Source: Self-asserted source
Ievgeniia Kuzminykh via Crossref Metadata Search

Investigation of the IoT Device Lifetime with Secure Data Transmission

2019 | Book chapter
Contributors: Ievgeniia Kuzminykh; Anders Carlsson; Maryna Yevdokymenko; Volodymyr Sokolov
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Mechanisms of ensuring security in Keystone service

Problemi telekomunìkacìj
2019 | Journal article
Part of ISSN: 2220-6922
Contributors: Ievgeniia Kuzminykh; Maryna Fliustikova
Source: Self-asserted source
Ievgeniia Kuzminykh via Crossref Metadata Search

Virtual Security Labs Supporting Distance Education in ReSeLa Framework

Advances in Intelligent Systems and Computing
2019 | Book
EID:

2-s2.0-85063026787

Contributors: Carlsson, A.; Kuzminykh, I.; Gustavsson, R.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier
grade
Preferred source (of 3)‎

Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture

2018 | Book chapter
Contributors: Ievgeniia Kuzminykh; Anders Carlsson
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Analysis of methods for reducing topology in wireless sensor networks

14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering, TCSET 2018 - Proceedings
2018 | Conference paper
EID:

2-s2.0-85047532588

Contributors: Popov, O.; Kuzminykh, I.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier
grade
Preferred source (of 3)‎

Measuring a LoRa Network: Performance, Possibilities and Limitations

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Book
EID:

2-s2.0-85054833958

Contributors: Carlsson, A.; Kuzminykh, I.; Franksson, R.; Liljegren, A.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier
grade
Preferred source (of 2)‎

Scheme for dynamic channel allocation with interference reduction in wireless sensor network

2017 4th International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2017 - Proceedings
2018 | Conference paper
EID:

2-s2.0-85046096370

Contributors: Sokolov, V.; Carlsson, A.; Kuzminykh, I.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier
grade
Preferred source (of 2)‎

Testing of communication range in ZigBee technology

2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics, CADSM 2017 - Proceedings
2017 | Conference paper
EID:

2-s2.0-85020128506

Contributors: Kuzminykh, I.; Snihurov, A.; Carlsson, A.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier
grade
Preferred source (of 2)‎

Development of traffic light control algorithm in smart municipal network

Modern Problems of Radio Engineering, Telecommunications and Computer Science, Proceedings of the 13th International Conference on TCSET 2016
2016 | Conference paper
EID:

2-s2.0-84969213530

Contributors: Kuzminvkh, I.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier

Development of smart infocommunication networks for intellectual municipal services

2015 2nd International Scientific-Practical Conference Problems of Infocommunications Science and Technology, PIC S and T 2015 - Conference Proceedings
2015 | Conference paper
EID:

2-s2.0-84962907359

Contributors: Kuzminykh, I.; Kabali, S.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier
grade
Preferred source (of 2)‎

A combined LIFO-Priority algorithm for overload control of SIP server

Modern Problems of Radio Engineering, Telecommunications and Computer Science - Proceedings of the 11th International Conference, TCSET'2012
2012 | Conference paper
EID:

2-s2.0-84861352774

Contributors: Kuzminykh, I.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier

Failover and load sharing in SIP-based IP telephony

TCSET 2008 - Modern Problems of Radio Engineering, Telecommunications and Computer Science - Proceedings of the International Conference
2008 | Conference paper
EID:

2-s2.0-77951281849

Contributors: Kuzminykh, I.
Source: Self-asserted source
Ievgeniia Kuzminykh via Scopus - Elsevier

Account on ResearchGate

Interactive resource
Source: Self-asserted source
Ievgeniia Kuzminykh

Peer review (28 reviews for 10 publications/grants)

Review activity for Applied sciences. (7)
Review activity for Computer standards & interfaces. (2)
Review activity for Computers & security. (2)
Review activity for Drones. (2)
Review activity for Electronics. (2)
Review activity for Future internet. (3)
Review activity for Information. (1)
Review activity for Iot. (1)
Review activity for Sensors. (7)
Review activity for Symmetry. (1)