Rychkova V.I.

Rychkova Valentina I.

Senior Lecturer

Department of Financial Monitoring (75, Кафедра финансового мониторинга (№75) института финансовых технологий и экономической безопасности НИЯУ МИФИ)

Engineer

Institute of Financial and Economic Safety: Education Division (Учебный отдел института финансовых технологий и экономической безопасности)
Works at MEPhI since 2015
Work Experience: 8 years

Education

2015 — National Research Nuclear University MEPhI
2017 — National Research Nuclear University MEPhI

Courses

1. E-business
2. Global Information Resources
3. Information resources in financial monitoring (advanced level)
4. Open Systems

Publication activity

1
h-index (Scopus)

Showing publications for last 3 years

  1. RSCI Analysis of the effectiveness of modern cybersecurity methods in the financial spheresAnalysis of the effectiveness of modern cybersecurity methods in the financial spheres // 2023 pp. 5-19
  2. RSCI Quantum key distribution in BB-84 protocol. Quantum encryptionQuantum key distribution in BB-84 protocol. Quantum encryption // 2023 pp. 230-236
  3. RSCI Tracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchain // 2022 pp. 45-52
  4. RSCI Managing the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformation // 2022 pp. 114-120
  5. RSCI Investigation of a network attack on an information system objectInvestigation of a network attack on an information system objectInvestigation of a network attack on an information system object // 2022 pp. 15-20
  6. RSCI The relevance of penetration testing for subsequent information securityThe relevance of penetration testing for subsequent information security // 2022 pp. 25-30
  7. RSCI Biometric identification in the digital economy in the context of national securityBiometric identification in the digital economy in the context of national securityBiometric identification in the digital economy in the context of national security // 2022 pp. 56-62
  8. RSCI Analysis of ways to deploy applications with microservices architectureAnalysis of ways to deploy applications with microservices architectureAnalysis of ways to deploy applications with microservices architecture // 2022 pp. 31-38
  9. RSCI Detection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowds // 2021 pp. 429-432
  10. RSCI Application of machine learning and deep learning methods in solving the problem of information security in the field of cloud technologies // 2021 pp. 539-545
  11. RSCI Application of voice and speech analysis in defense against social engineering // 2021 pp. 513-516
  12. RSCI Social engineering in the context of the threat to the economic security of the enterprise // 2021 pp. 719-724
  13. RSCI Methodological basis for SOC // 2021 pp. 334-340

Showing conferences for last 3 years

Conferences not found

The agreement on processing personal data is obtained in accordance with the Federal Law "On Personal Data" from 27/07/2006 N 152-FZ