პუბლიკაციები

  1. Iavich M., Iashvili G.
     Privacy-preserving security operations: Bridging the conformance gap between SOC efficiency and GDPR compliance. Cybersecurity Providing in the Digital Age (CEUR-WS, Vol. 4145), 2025.

  2. Gagnidze A., Iavich M., Iashvili G., Kuchukhidze T.
     Post-quantum pseudo random number generators. Scientific and Practical Cyber Security Journal, 2025.

  3. Iavich M., Gnatyuk S., Kuchukhidze T., Iashvili G.
     Balancing security and efficiency in deterministic random bit generators for post-quantum cryptography. CH&CMiGIN, 2024.

  4. Odarchenko R., Iavich M., Iashvili G., Fedushko S., Syerov Y.
     Assessment of security KPIs for 5G network slices for special groups of subscribers. Big Data and Cognitive Computing, 7(4):169, 2023.

  5. Iashvili G., Iavich M.
     Enhancing cyber intelligence capabilities through process automation: Advantages and opportunities. IVUS, pp. 92–101, 2023.

  6. Akhalaia G., Iavich M., Iashvili G., Prysiazhnyy D., Smirnova T.
     Secure encrypted connection on Georgian website. CEUR Workshop Proceedings, Vol. 3550, pp. 313–320, 2023.

  7. Iashvili G., Odarchenko R., Gnatyuk S., Gagnidze A.
     Use of machine learning in recommender systems. Scientific and Practical Cyber Security Journal, 2023.

  8. Iashvili G., Odarchenko R., Gnatyuk S., Gagnidze A.
     Recommender systems use in cybersecurity field. Scientific and Practical Cyber Security Journal, 2023.

  9. Iavich M., Gnatyuk S., Iashvili G., Odarchenko R., Simonov S.
     5G security function and its testing environment. International Scientific-Practical Conference “Information Technology for …”, 2022.

  10. Iavich M., Iashvili G., Odarchenko R., Gnatyuk S., Gagnidze A.
     Developing security recommender system using content-based filtering mechanisms. International Scientific-Practical Conference “Information Technology for …”, 2022.

  11. Iavich M., Gagnidze A., Iashvili G.
     The initial concepts of post-quantum signature design using Verkle tree. Scientific and Practical Cyber Security Journal, 2022.

  12. Iavich M., Iashvili G., Avkurova Z., Dorozhynskyi S., Fesenko A.
     Machine learning algorithms for 5G networks security and the corresponding testing environment. differences, 1(2), 2022.

  13. Iavich M., Mirtskhulava L., Iashvili G., Globa L.
     5G laboratory for checking machine learning algorithms. 2021 IEEE International Conference on Information and Telecommunication …, 2021.

  14. Iavich M., Kuchukhidze T., Iashvili G., Gnatyuk S.
     Hybrid quantum random number generator for cryptographic algorithms. Radioelectronic and Computer Systems, pp. 103–118, 2021.

  15. Iavich M., Iashvili G., Gnatyuk S., Tolbatov A., Mirtskhulava L.
     Efficient and secure digital signature scheme for post quantum epoch. International Conference on Information and Software Technologies, pp. 185–193, 2021.

  16. Iashvili G., Iavich M., Bocu R., Odarchenko R., Gnatyuk S.
     Intrusion detection system for 5G with a focus on DOS/DDOS attacks. 2021 11th IEEE International Conference on Intelligent Data Acquisition and …, 2021.

  17. Iashvili G., Iavich M., Gnatyuk S., Odarchenko R., Simonov S.
     Simulated test laboratory for 5G test patterns. 2021 11th IEEE International Conference on Intelligent Data Acquisition and …, 2021.

  18. Iavich M., Iashvili G., Gagnidze A., Odarchenko R.
     Use of content-filtering method for hardware vulnerabilities identification system. 2021 IEEE 4th International Conference on Advanced Information and …, 2021.

  19. Iavich M., Bocu R., Iashvili G., Odarchenko R.
     A post-quantum secure e-Health system for the data management. 2021 IEEE 4th International Conference on Advanced Information and …, 2021.

  20. Iavich M., Kuchukhidze T., Iashvili G., Gnatyuk S., Bocu R.
     Novel quantum random number generator with the improved certification method. International Journal of Mathematical Sciences and Computing, 2021.

  21. Iashvili G., Avkurova Z., Iavich M., Bauyrzhan M., Gagnidze A., Gnatyuk S.
     Content-based machine learning approach for hardware vulnerabilities identification system. International Conference on Computer Science, Engineering and Education …, 2021.

  22. Iashvili G.
     Post-quantum digital signature scheme with BB84 protocol. 2021.

  23. Iavich M., Gagnidze A., Iashvili G., Simonov S., Bocu R.
     Novel intrusion detection system for 5G. IVUS, pp. 27–34, 2021.

  24. Mgebrishvili N., Iavich M., Iashvili G., Nodia A.
     Secure software for rail circuits in the form of distributed sensors. WSEAS Transactions on Information Science and Applications, 18:20–25, 2021.

  25. Labadze G., Iavich M., Iashvili G., Gagnidze A., Gnatyuk S.
     Post-quantum digital signature scheme with BB84 protocol. IVUS, pp. 35–44, 2021.

  26. Iashvili G.
     Novel system for hardware-based vulnerabilities recognition. Scientific and Practical Cyber Security Journal, 2021.

  27. Iavich M., Bocu R., Iashvili G., Gnatyuk S.
     Novel method of hardware security problems identification. 2020 IEEE International Conference on Problems of Infocommunications …, 2020.

  28. Iavich M., Iashvili G., Bocu R., Gnatyuk S.
     Post-quantum digital signature scheme for personal data security in communication network systems. International Conference of Artificial Intelligence, Medical Engineering …, 2020.

  29. Iashvili G., Polishchuk Y., Prysiazhnyy D.
     Improved post-quantum Merkle algorithm based on threads. Advances in Computer Science for Engineering and Education III, p. 454, 2020.

  30. Iavich M., Gagnidze A., Iashvili G., Okhrimenko T., Arakelian A., Fesenko A.
     Improvement of Merkle signature scheme by means of optical quantum random number generators. International Conference on Computer Science, Engineering and Education …, 2020.

  31. Iavich M., Gnatyuk S., Arakelian A., Iashvili G., Polishchuk Y., Prysiazhnyy D.
     Improved post-quantum Merkle algorithm based on threads. International Conference on Computer Science, Engineering and Education …, 2020.

  32. Iavich M., Nachkhebia L.
     Intrusion detection system for 5G. 2020.

  33. Iashvili G., Iavich M., Gagnidze A., Gnatyuk S.
     Increasing usability of TLS certificate generation process using secure design. IVUS, pp. 35–41, 2020.

  34. Iavich M., Bocu R., Arakelian A., Iashvili G.
     Post-quantum digital signatures with attenuated pulse generator. IVUS, pp. 42–45, 2020.

  35. Iashvili G., Chaladze R., Begashvili D., Sagradian V., Sanarski L.
     Open-source intelligence. Scientific and Practical Cyber Security Journal, 2020.

  36. Iashvili G., Meladze G., Chachibaia G., Janjalashvili L., Shavdatuashvili G.
     Attacks on wireless networks and their preventions. Scientific and Practical Cyber Security Journal, 2020.

  37. Iavich M., Kuchukhidze T., Gagnidze A., Iashvili G.
     Advantages and challenges of QRNG integration into Merkle. Scientific and Practical Cyber Security Journal, 4:93–102, 2020.

  38. Iavich M., Iashvili G., Gagnidze A., Nachkebia L., Khukhashvili S.
     The analysis of the difference of 4G and 5G securities. Scientific and Practical Cyber Security Journal, 2020.

  39. Iavich M., Gnatyuk S., Fesenko G.
     Cyber security European standards in business. Scientific and Practical Cyber Security Journal, 3(2):36–39, 2019.

  40. Gnatyuk S., Iavich M., Iashvili G., Fesenko A.
     Ensuring European civil aviation cybersecurity. Scientific and Practical Cyber Security Journal, 2019.

  41. Iashvili G., Iavich M., Gnatyuk S., Fesenko A.
     Security methods against modern cyber attack vectors in countries of Europe. Scientific and Practical Cyber Security Journal, 2019.

  42. Megrelishvili R., Jinjikhadze M., Gagnidze A., Iavich M., Iashvili G.
     Generation of high order primitive matrix elements for post-quantum key exchange protocol. IVUS, pp. 48–51, 2019.

  43. Iavich M., Gagnidze A., Iashvili G., Gnatyuk S., Vialkova V.
     Lattice based Merkle. IVUS 2470, 6, 2019.

  44. Gagnidze A., Iavich M., Iashvili G.
     Improvement of hash based digital signature. CEUR Workshop Proceedings (CEUR-WS.org), 2018.

  45. Iavich M., Gagnidze A., Iashvili G.
     Hybrid post quantum crypto system (Гибридная пост квантовая крипто система). Scientific and Practical Cyber Security Journal, 2018.

  46. Iavich M., Gagnidze A., Iashvili G.
     Hash based digital signature scheme with integrated TRNG. CEUR Workshop Proceedings, Vol. 2145, pp. 79–82, 2018.

  47. Megrelishvili R., Gagnidze A., Jinjikhadze M., Kutaisi G., Iashvili G., Iavich M.
     Post-quantum key exchange protocol using high dimensional matrix. International Conference on Information Technologies, CEUR-WS Vol. 2145, pp. 83–87, 2018.

  48. Iavich M., Gagnidze A., Iashvili G.
     Hybrid post quantum crypto system. Scientific and Practical Cyber Security Journal, 2018.

  49. Gagnidze A., Iavich M., Iashvili G.
     Merkle with quantum TRNG. Scientific and Practical Cyber Security Journal, 1(2):14–20, 2017.

  50. Gagnidze A.
     Some aspects of post-quantum cryptosystems. Eurasian Journal of Business and Management, 2017.

  51. Gagnidze A., Iavich M., Inasaridze N., Iashvili G.
     Analysis of one-time signature schemes. Scientific and Practical Cyber Security Journal, 1:20–23, 2017.

  52. Gagnidze A., Iavich M., Iashvili G.
     Novel version of Merkle cryptosystem. Bulletin of the Georgian National Academy of Sciences, 11(4), 2017.

  53. Gagnidze A., Iavich M., Inasaridze N., Iashvili G., Vyalkova V.
     Critical analysis of hash based signature schemes. International Journal of Cyber-Security and Digital Forensics, 7:47–55, 2017.

  54. Gagnidze A., Iavich M., Iashvili G.
     Analysis of post quantum cryptography use in practice. Bulletin of the Georgian National Academy of Sciences, 11(2):29–36, 2017.

Book Chapters

 

  1. Odarchenko R., Iavich M., Iashvili G., Gagnidze A.
    5G network security. In: Handbook of Cybersecurity, pp. 129–147.

Other Works (as listed on Google Scholar)

 

  1. Megrelishvili R., Kutaisi G., Gagnidze A., Iavich M., Iashvili G.
    Generation of high order primitive matrix elements with elements of abelian multiplicative groups with different power for post-quantum key exchange protocol. INFORMACINĖS TECHNOLOGIJOS, 64.

  2. Iavich M., Iashvili G.
    Design of multi-user systems based on human computer interaction.

  3. Iavich M., Avtandil G., Iashvili G.
    Hybrid post quantum crypto system (Hybrid post quantum crypto system / Гибридная пост квантовая крипто система).

Iavich M., Iashvili G.


CAPTCHA analysis and its problems.