Personal information

Ukraine

Activities

Employment (2)

Zhytomyr Polytechnic State University: Zhytomyr, Zhytomyr region, UA

2020-08-31 to present | Senior Lecturer (Department of Computer Engineering and Cybersecurity)
Employment
Source: Self-asserted source
Yelyzaveta M. Trokoz

Zhytomyr Polytechnic State University: Zhytomyr, Zhytomyr region, UA

2017-08-31 to 2020-08-31 | assistant (Department of Computer Engineering and Cybersecurity)
Employment
Source: Self-asserted source
Yelyzaveta M. Trokoz

Education and qualifications (2)

Zhytomyr Military Institute named after S.P. Korolova: Zhytomyr, Zhytomyr region, UA

2016 to 2017 | spetsialist (Department of Cybersecurity)
Education
Source: Self-asserted source
Yelyzaveta M. Trokoz

National Aviation University: Kyiv, Kyiv region, UA

2012 to 2016 | bachelor (Department of Information and Communication Systems Security)
Education
Source: Self-asserted source
Yelyzaveta M. Trokoz

Professional activities (1)

Cisco Networking Academy: Zhytomyr, Zhytomyr region, UA

instructor (Cisco Academy of Zhytomyr State Politechnic University)
Membership
Source: Self-asserted source
Yelyzaveta M. Trokoz

Works (9)

Моделювання загроз канального рівня в OWASP Threat Dragon з розробкою стратегії захисту

Технічна інженерія
2024-07-17 | Journal article
Contributors: Ye.M. Trokoz; O.A. Pokotylo; N.O. Shchur
Source: check_circle
Crossref

ELLIPTIC CURVE CRYPTOGRAPHY AND ITS PRACTICAL APPLICATION

Cybersecurity: Education, Science, Technique
2023 | Journal article
Contributors: Nataliia Shchur; Oleksandra Pokotylo; Yelyzaveta Bailiuk
Source: check_circle
Crossref

Modeling Attacks on the DHCP Protocol in the GNS3 Environment and Determining Methods of Security Against Them

CEUR Workshop Proceedings
2023 | Conference paper
EID:

2-s2.0-85178360345

Part of ISSN: 16130073
Contributors: Vakaliuk, T.; Trokoz, Y.; Pokotylo, O.; Osadchyi, V.; Smirnov, S.
Source: Self-asserted source
Yelyzaveta M. Trokoz via Scopus - Elsevier

АНАЛІЗ КІБЕРАТАК НА ACTIVE DIRECTORY ТА МЕТОДІВ ПІДВИЩЕННЯ РІВНЯ ЗАХИЩЕНОСТІ ОПЕРАЦІЙНОЇ СИСТЕМИ WINDOWS SERVER

Вісник Херсонського національного технічного університету
2023-06-28 | Journal article
Contributors: Y. M. BAILIUK; O. A. POKOTYLO; O. S. HOLOVNIA; I. S. KHIMICHUK
Source: check_circle
Crossref

Interactive surveys during online lectures for IT students

CTE Workshop Proceedings
2023-03-21 | Journal article
Contributors: Olena S. Holovnia; Natalia O. Shchur; Iryna A. Sverchevska; Yelyzaveta M. Bailiuk; Oleksandra A. Pokotylo
Source: check_circle
Crossref

AN OVERVIEW OF ONLINE GAMING SERVICES FOR LEARNING PROGRAMMING LANGUAGES

Innovate Pedagogy
2020 | Journal article
Part of ISSN: 2663-6085
Contributors: T.A. Vakaliuk; V.V. Bolotina; Ye.M. Bailiuk; O.A. Pokotylo
Source: Self-asserted source
Yelyzaveta M. Trokoz via Crossref Metadata Search

THE “MAN-IN-THE-MIDDLE” ATTACKS ANALYSIS, METHODS OF THEIR DETECTION AND HOW TO PREVENT THEM

Collection of Scientific Publications NUS
2020 | Journal article
Part of ISSN: 2311-3405
Contributors: Yelyzaveta M. Bailiuk; Viktoriia V. Bolotina; Oleksandra A. Pokotylo
Source: Self-asserted source
Yelyzaveta M. Trokoz via Crossref Metadata Search

Using massive open online courses in teaching the subject "computer networks" to the future IT specialists

CEUR Workshop Proceedings
2020 | Conference paper
EID:

2-s2.0-85096122908

Part of ISSN: 16130073
Contributors: Vakaliuk, T.A.; Yefimenko, A.A.; Bolotina, V.V.; Bailiuk, Y.M.; Pokotylo, O.A.; Didkivska, S.
Source: Self-asserted source
Yelyzaveta M. Trokoz via Scopus - Elsevier

Comparative analysis of the symmetric block transformation algorithm "Kalyna" (DSTU 7624: 2014) with other international data encryption standards

Collection of scientific works "Problems of creation, testing, application and operation of complex information systems"
2018 | Journal article
Source: Self-asserted source
Yelyzaveta M. Trokoz