*Tkhelidze M. G., Misheladze C, G., Iavich M.P.; The concept of teaching information technology in primary school and pre-school age. Elmi-metodik Jurnal, 2010, 3, Baku: p. 37-44
*Iavich M.P., Bibiluri M.V.,; To the method of preparation and arranging computer science lessons in primary school. Baku: Elmimetodik jurnal; 2011, 3, p.68-72.
*Iavich M.P.; Computer technology as a means of intellectual development. Journal of actual problems of modern science; № 6, 2012. p. 364-366.
*Iavich M.P.; The concept of creation of intellectual computer games for preschool children. Engineering in Russia and abroad (II): Proceedings of the international scientific Conference; Moscow; November 2012, p. 163-165.
*Iavich M.P.; The concept of creation of intellectual computer science materials for preschool children. Engineering in Russia and abroad (II): Proceedings of the International Scientific Conference; Moscow, November 2012, p. 162-163
*Iavich M.P.; Theoretical foundations of computer science. Concept creation of e-learning tools and intellectual computer games for children. Moscow State University named after Lomonosov. International scientific practical conference. Moscow:2012, с. 163-165.
*Iavich M.P.; Electronic textbook: advantages and disadvantages // Modern scientific researches and innovations. 2012. № 10 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2012/10/16884.
*Iavich M.P.; Some Particularities of the IST and Computer Technologies Use in the Preschool and Primary School Education // Modern scientific researches and innovations. 2013. № 1 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2013/01/19788
*Iavich M.P.; Using fonts theory when making electronic text book // Modern scientific researches and innovations. 2013. № 5 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2013/05/24104
*Iavich M.P.; Using color theory when making electronic text book; Modern scientific researches and innovations. 2013. № 5 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2013/05/24076
*Gurtskaia P.A., Iavich M.P.; Pupils ditribution by group in educational social network; Modern scientific researches and innovations. 2013. № 5 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2013/05/24658
*Iavich M.P.; Concepts and training programs for students of middle and high school age; Modern scientific researches and innovations. 2013. № 6 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2013/06/25261
*Iavich M.P., Popova D.S.; Using QBasic in children teaching; Modern scientific researches and innovations. 2013. № 6 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2013/06/24665
*Iavich, M.; Mathematical Model of Social Educational Networks. J Math Sci 216, 553-557; 2016. https://doi.org/10.1007/s10958-016-2913-z
*Iavich M.P., Iashvili G.U.; A comparison of websites optimizing processes in search engines using PHP and HTML; Modern technics and technologies. 2014. № 3 [Electronic journal]. URL: http://technology.snauka.ru/en/2014/03/3233
*Iavich M.P., Isaev P.D.; Problems associated with the creation of the own cryptosystems; Modern scientific researches and innovations. 2014. № 4. P. 1 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2014/04/33150
*Iavich M.P., Pirtskhalava I.Z.; Captcha development problems; Modern technics and technologies. 2015. № 7 [Electronic journal]. URL: http://technology.snauka.ru/en/2015/07/7577
*Iavich M.P., Samushia N.P., Tavberidze G.A.; Simulation of computer game positive influence on educational process; Modern scientific researches and innovations. 2016. № 3 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2016/03/64576
*Gagnidze A.G., Iavich M.P., Iashvili G.U.; Post-quantum cryptosystems; Modern scientific researches and innovations. 2016. № 5 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2016/05/67264
*Gagnidze , Iavich M., Iashvili G.; Some Aspects of Post-Quantum Cryptosystems; Abstract book; Euro-Asia Forum In Politics Economics and Business – 2016; July 21-22, 2016; Belgrade, Serbia.
*Gagnidze A., Iavich M., Iashvili G.; Some Aspects of Post-Quantum Cryptosystems; Eurasian Journal of Business and Management, 4(4), 2016.
*Gagnidze A.G., Iavich M.P., Iashvili G.U.; Lattice based post-quantum cryptosystems; Modern scientific researches and innovations. 2016. № 10 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2016/10/72575
*Gagnidze, M. Iavich, G. Iashvili; Attacks on post-quantum cryptosystems; Taras Shevchenko National University of Kyiv, 17-th International Young Scientists Conference” Optics & High Technology Material Science – SPO 2016”, October 27th – 30th, Abstract Book, 2016.
*Gagnidze A.G., Iavich M.P., Iashvili G.U.; Multivariate public key crypto-systems; Modern scientific researches and innovations. 2016. № 11 [Electronic journal]. URL: http://web.snauka.ru/en/issues/2016/11/74225
*Iavich M.P., Baranov M.V.; Simulation of online tutorial’s positive influence on educational process; Modern scientific researches and innovations. 2017. № 2 [Electronic journal]. URL: http://web.snauka.ru/issues/2017/02/78629
*Gagnidze A.G., Iavich M.P., Iashvili G.U.; Improved version of Merkle crypto system; Modern scientific researches and innovations. № 5 [Electronic journal]. URL: http://web.snauka.ru/issues/2017/05/81949
*Iavich M., Iashvili G.; Hash Based Crypto-Systems Use In Post-Quantum Cryptography; II Scientific conference "Problems of cybersecurity information and telecommunication systems", Faculty of Information Technology Taras Shevchenko National University of Kyiv, 23-24 March, 2017, Abstract Book
*Gagnidze A., Iavich M.; Lattices Use in Post-Quantum Cryptography; II Scientific conference "Problems of cybersecurity information and telecommunication systems", Faculty of Information Technology Taras Shevchenko National University of Kyiv, 23-24 March, 2017, Abstract Book
*Iavich M., Arakeliani. A.; Implementation of Merkle and its analyses; Modern scientific researches and innovations. № 6 URL: http://web.snauka.ru/issues/2017/06/83971
*Gagnidze , Iavich M., Iashvili G., Inasaridze N., Vyalkova V.; Critical Analysis of Hash Based Signature Schemes; International Journal of Cyber-Security and Digital Forensics (IJCSDF), Vol 7. N1, 2017, p. 47-55.
*Iavich M. Vialkova V.; Critical Analysis of Signature Schemes; International Scientific Conference - State and Prospects of Reforming Sector of Security and Defense in Ukraine, Vol 1. 2017, p. 470-472.
*Gnatyuk , Kinzeryavyy V., Iavich M., Prysiazhnyi D., Yubuzova K.; High-Performance Reliable Block Encryption Algorithms Secured against Linear and Differential Cryptanalytic Attacks; ICTERI 2018; http://ceur-ws.org/Vol-2104/; 2018.
*Megrelishvili R., Jinjikhadze M., Iavich M., Gagnidze A., Iashvili G.; Post-quantum key-exchange protocols; IVUS 2018; http://ceur-ws.org/Vol-2145/; 2019.
*Gagnidze A., Iavich M., Iashvili G.; Improvement of Hash Based Digital Signature; CEUR Workshop Proceedings; CEUR-WS.org; 2018
*Iavich M., Gnatyuk S., Iashvili G, Fesenko A.; Cyber security European standards in business; Scientific and Practical Cyber Security Journal, 2019.
*Iavich M., Gnatyuk S., Iashvili G, Fesenko A.; Security methods against modern cyber-attack vectors in countries of Europe; Scientific and Practical Cyber Security Journal, 2019.
*Iavich M., Gnatyuk S., Iashvili G, Fesenko A.; Ensuring European Civil Aviation Cybersecurity; Scientific and practical cyber security journal, 2019.
*Gnatyuk, Iavich M., Polishchuk Y., Jintcharadze E., Fesenko A.; Comparison and hybrid implementation of Blowfish, Twofish and RSA cryptosystems; IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON); DOI:10.1109/UKRCON.2019.8880005; 2019.
*Hu Zh., Gnatyuk S., Okhrimenko(Zhmurko) T., Kinzeryavyy V., Iavich I, Yubuzova Kh.; High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits; ICTERI 2019; http://ceur-ws.org/Vol-2393/; 2019.
*Megrelishvili , Jinjikhadze M, Gagnidze A., Iavich M., Iashvili G.; Generation of high order primitive matrix elements for post-quantum key exchange protocol; IVUS-2019; http://ceur-ws.org/Vol-2470/; pp. 48-51; 2019.
*Jintcharadze , Iavich M.; Public-Key hybrid cryptosystem based on Blowfish and RSA; IVUS-2019; http://ceur-ws.org/Vol-2470/; pp. 52-55; 2019.
*Iavich M., Gagnidze A., Iashvili G., Gnatyuk S., Vialkova V.; Lattice based Merkle; IVUS-2019; http://ceur-ws.org/Vol-2470/; pp. 13-16; 2019.
*Gnatyuk S., Okhrimenko T., Iavich M., Berdibayev R.; Intruder Control Mode Simulation of Deterministic Quantum Cryptography Protocol for Depolarized Quantum Channel; IEEE International Scientific-Practical Conference Problems of Info-communications, Science and Technology (PIC S&T); DOI: 1109/PICST47496.2019.9061293; 2019.
*Kraus N., Andrusiak N., Savchenko A., Iavich M.; Practices of Using Blockchain Technology in ICT under the Digitalization of the World Economy; CMiGIN 2019; http://ceur-ws.org/Vol-2588/; 2020.
*Zhukov I., Pechurin N., Kondratove L., Iavich M.; Increasing the Accuracy of the Information Load Annual Growth Evaluation on the Internet of Things; CMiGIN 2019; http://ceur-ws.org/Vol-2588/; 2020.
*Okhrimenko T., Tynymbayev S., Iavich M.; High-Speed and Secure PRNG for Cryptographic Applications; I. J. Computer Network and Information Security, 2020, 3; DOI: 10.5815/ijcnis.2020.03.01.
*Kazmirchuk S., Ilyenko A., Ilyenko S., Olesya Y., Herasymenko M. Iavich M.; Improved Gentry's Fully Homomorphic Encryption Scheme: Design, Implementation and Performance Evaluation; S. Kazmirchuk, CybHyg 2019; http://ceur-ws.org/Vol-2654/; 2020.
*Kozhokhina O., Shcherbyna O., Churzha O., Yehorov S., Iavich M.; Churkin N. Informational Technology for the Improvement of Flight Zone Security; CybHyg 2019; http://ceur-ws.org/Vol-2654/; 2020.
*Iavich M., Gnatyuk S., Arakelian A., Iashvili G., Polishchuk Y., Prysiazhnyy D.; Improved Post-quantum Merkle Algorithm Based on Threads. In: Hu Z., Petoukhov S., Dychka I., He M. (eds) Advances in Computer Science for Engineering and Education III. ICCSEEA 2020. Advances in Intelligent Systems and Computing, vol. 1247., 2021; Springer, Cham. https://doi.org/10.1007/978-3-030-55506-1_41.
*Iavich M., Gagnidze A., Iashvili G., Okhrimenko T., Arakelian A., Fesenko A.; Improvement of Merkle Signature Scheme by Means of Optical Quantum Random Number Generators; Advances in Computer Science for Engineering and Education III (pp.440-453), 2020; DOI:1007/978-3-030-55506-1_40.
*Turovsky , Khlaponin Y., Hassan Mohamed M., Okhrimenko T., Goncharenko I., Iavich M.; Combined System of Phase Synchronization with Increased Astatism order in Frequency Monitoring Mode; COAPSN 2020; http://ceur-ws.org/Vol-2616/; 2020.
*Jintcharadze E., Iavich M.; Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems; IEEE East-West Design & Test Symposium (EWDTS), 1-5; 2020; DOI:1109/EWDTS50664.2020.9224901; 2020.
*Gnatyuk , Kinzeryavyy V., Iavich M., Odarchenko R., Berdibayev R., Burmak Y.; Studies on Cryptographic Security and Speed Analysis of New Advanced Block Cipher; ICST 2020; http://ceur-ws.org/Vol-2711/; 2020.
*Iashvili G., Iavich M., Gagnidze A., Gnatyuk S.; Increasing Usability of TLS Certificate Generation Process Using Secure Design; IVUS-2020; http://ceur-ws.org/Vol-2698/; 2020.
*Iavich M., Bocu R., Arakelian A., Iashvili G.; Post-Quantum Digital Signatures with Attenuated Pulse Generator; IVUS-2020; http://ceur-ws.org/Vol-2698/; 2020.
*Iavich , Iashvili G., Gagnidze A., Nachkebia L., Khukhashvili S.; The analysis of the difference of 4G and 5G securities; Scientific and Practical Cyber Security Journal, (SPCSJ) 4(3); 2020.
*Myna Zh., Banakh V., Andriy Nahirnyak, Iavich M.; Analysis of the Essence of Social Networks as a Tool for Mediatization of the Historical and Cultural Heritage of Museums; COAPSN 2020; (pp.199-213); http://ceur-ws.org/Vol-2616/.
*Iavich M., Iashvili G., Bocu R., Gnatyuk S.; Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems; In: Hu Z., Petoukhov S., He M. (eds) Advances in Artificial Systems for Medicine and Education IV. AIMEE 2020. Advances in Intelligent Systems and Computing, vol 1315., 2020; Springer, Cham. https://doi.org/10.1007/978-3-030-67133-4_28.
*Zaliskyi M., Odarchenko R., Petrova Y., Iavich M., Pirtskhalava I. Mathematical Model Building for COVID-19 Diseases Data in European Countries; IDDM 2020 The 3rd International Conference on Informatics & Data-Driven Medicine; http://ceur-ws.org/Vol-2753/.
*Bocu R., Iavich M., Gnatyuk S., Ospanova D., Sotnichenko Y.; Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices; Cybersecurity Providing in Information and Telecommunication Systems 2021 (CPITS 2021); pp. 164-174; http://ceur-ws.org/Vol-2923/paper18.pdf, 2021.
*Iavich M., Kuchukhidze T., Iashvili G., Gnatyuk S., Bocu R.; Novel Quantum Random Number Generator with the Improved Certification Method ", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.7, No.3, pp. 41-53, 2021. DOI: 10.5815/ijmsc.2021.03.05
*Iavich M., Gagnidze A., Iashvili G., Simonov S., Bocu R.; Novel Intrusion Detection System for 5G; IVUS 2021; pp. 27-34; http://ceur-ws.org/Vol-2915/paper4.pdf, 2021.
*Labadze G., Iavich M., Iashvili G., Gagnidze A., Gnatyuk S.; Post-Quantum Digital Signature Scheme with BB84 Protocol; IVUS 2021; pp. 35-44; http://ceur-ws.org/Vol-2915/paper5.pdf, 2021
*Babenko T., Hnattienko H., Ignisca V., Iavich M.; Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems; IVUS 2021; pp. 92-101; http://ceur-ws.org/Vol-2915/paper11.pdf, 2021
*Iavich M., Iashvili G., Gnatyuk S., Tolbatov A., Mirtskhulava L.; Efficient and Secure Digital Signature Scheme for Post Quantum Epoch; In: Lopata A., Gudonienė D., Butkienė R. (eds); Information and Software Technologies. ICIST 2021. Communications in Computer and Information Science, vol 1486. Springer, Cham., 2021; https://doi.org/10.1007/978-3-030-88304-1_15
*Gnatyuk S., Berdibayev R., Smirnova T., Avkurova Z., Iavich M.; Cloud-Based Cyber Incidents Response System and Software Tools; (eds) Lopata A., Gudonienė D., Butkienė R.; Information and Software Technologies. ICIST 2021. Communications in Computer and Information Science, vol 1486. Springer, Cham. https://doi.org/10.1007/978-3-030-88304-1_14
*Iavich M., Akhalaia G., Gnatyuk S.; Method of Improving the Security of 5G Network Architecture Concept for Energy and Other Sectors of the Critical Infrastructure; (eds) Zaporozhets A.; Systems, Decision and Control in Energy III. Studies in Systems, Decision and Control, vol 399. Springer, Cham. 2022; https://doi.org/10.1007/978-3-030-87675-3_14
*Bocu, R.; Bocu, D., Iavich, M.; Objects Detection Using Sensors Data Fusion in Autonomous Driving Scenarios; Electronics 2021, 10, 2903. https://doi.org/10.3390/electronics10232903
*Bocu R., Iavich M., Gnatyuk S., Ospanova D., Sotnichenko Y.; Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices; Cybersecurity Providing in Information and Telecommunication Systems; CPITS 2021; pp. 164-174; http://ceur-ws.org/Vol-2923/paper18.pdf, 2021.
*Iavich M., Kuchukhidze T., Iashvili G., Gnatyuk S., Boku R.; Novel Quantum Random Number Generator with the Improved Certification Method; International Journal of Mathematical Sciences and Computing(IJMSC); Vol.7, No.3, pp. 41-53, 2021. DOI: 10.5815/ijmsc.2021.03.05
*Babenko T., Hnatiienko H., Ignisca V., Iavich M.; Modeling of Critical Nodes in Complex Poorly Structured Organizational Systems; IVUS 2021; pp. 92-101; http://ceur-ws.org/Vol-2915/paper11.pdf, 2021.
*Iavich M., Iashvili G., Gnatyuk S., Tolbatov A., Mirtskhulava L.; Efficient and Secure Digital Signature Scheme for Post Quantum Epoch; (eds): Lopata A., Gudonienė D., Butkienė R.; Information and Software Technologies. ICIST 2021. Communications in Computer and Information Science; vol 1486. Springer, Cham.; 2021; https://doi.org/10.1007/978-3-030-88304-1_15
*Gnatyuk S., Berdibayev R., Smirnova T., Avkurova Z., Iavich M.; Cloud-Based Cyber Incidents Response System and Software Tools; (eds): Lopata A., Gudonienė D., Butkienė R.; Information and Software Technologies. ICIST 2021. Communications in Computer and Information Science; vol 1486. Springer, Cham. 2021; https://doi.org/10.1007/978-3-030-88304-1_14
*Iavich M., Akhalaia G., Gnatyuk S.; Method of Improving the Security of 5G Network Architecture Concept for Energy and Other Sectors of the Critical Infrastructure; (eds) Zaporozhets A.; Systems, Decision and Control in Energy III. Studies in Systems, Decision and Control; vol 399. Springer, Cham.; 2022; https://doi.org/10.1007/978-3-030-87675-3_14
*Bocu, R., Bocu, D., Iavich, M.; Objects Detection Using Sensors Data Fusion in Autonomous Driving Scenarios; Electronics; 2021, 10, 2903. https://doi.org/10.3390/electronics10232903
*Iavich M., Kuchukhidze T., Iashvili G., Gnatyuk S.,; Hybrid quantum random number generator for cryptographic algorithms; Radioelectronic And Computer Systems; 4, 2021. DOI: https://doi.org/10.32620/reks.2021.4.09
*Iashvili G., Iavich ., Gnatyuk S., Odarchenko R., Simonov S.; Simulated Test Laboratory for 5G Test Patterns; 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021, pp. 521-526, doi: 10.1109/IDAACS53288.2021.9660842.
*Iashvili , Iavich M., Bocu R., Odarchenko R., Gnatyuk S.; Intrusion Detection System for 5G with a Focus on DOS/DDOS Attacks; 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021, pp. 861-864, doi: 10.1109/IDAACS53288.2021.9661021.
*Iavich M., Bocu R., Iashvili G., Odarchenko R.; A Post-Quantum Secure e-Health System for the Data Management; 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT), 2021, pp. 270-276, doi: 10.1109/AICT52120.2021.9628896
*Iavich M., Iashvili G., Gagnidze A., Odarchenko R.; Use of Content-Filtering Method for Hardware Vulnerabilities Identification System; 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT), 2021, pp. 132-136, doi: 10.1109/AICT52120.2021.9628948
*Bocu, R., Iavich, M.; Enhanced Autonomous Driving Through Improved 3D Objects Detection; In: Barolli, L., Hussain, F., Enokido, T. (eds); Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 449. Springer, Cham., 2022; https://doi.org/10.1007/978-3-030-99584-3_6
*Iavich, M., Bocu, R., Gagnidze, A.; Real Time Self-developing Cybersecurity Function for 5G. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 451. Springer, Cham.; 2022; https://doi.org/10.1007/978-3-030-99619-2_36
*Gagnidze A., Iavich M.; Demand-side Factors of the Georgian Cars’ Leasing Market; American International Journal of Business Management (AIJBM) ISSN- 2379-106X, www.aijbm.com Volume 5, Issue 04 (April-2022), PP 43-48. https://www.aijbm.com/wp-content/uploads/2022/04/F544348.pdf
*Bocu, R., Iavich, M.; Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks; Symmetry 2023, 15, 110. https://doi.org/10.3390/sym15010110
*Bocu, R., Bocu, D., Iavich, M.; An Extended Review Concerning the Relevance of Deep Learning and Privacy Techniques for Data-Driven Soft Sensors; Sensors 2023, 23, 294. https://doi.org/10.3390/s23010294
*Palekha Y., Zozulia N., Moskovchenko N., Sadovenko V., Vovk N, Iavich M.; Technological Processes of Working with Documented Information in the Organization as an Indicator of Corporate Information Subculture; pp. 229-240; https://ceur-ws.org/Vol-3296/
*Iavich M., Iashvili G., Avkurova Zh., Dorozhynskyi S., Fesenko A.; Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment; Cybersecurity Providing in Information and Telecommunication Systems II 2021 (CPITS-II-1 2021); pp. 139-149; http://ceur-ws.org/Vol-3187/
*Iavich M., Ospanova D., Grdzelidze K., Brzhanov R., Polishchuk P.; Advanced Data Security and Privacy Ensuring Methods in 5G Era; Cybersecurity Providing in Information and Telecommunication Systems II 2021 (CPITS-II-1 2021); pp. 160–169; http://ceur-ws.org/Vol-3187/
*Iavich, M., Kuchukhidze, T.; The Novel Multi Source Method for the Randomness Extraction; In: Hu, Z., Wang, Y., He, M. (eds); Advances in Intelligent Systems, Computer Science and Digital Economics IV; CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 158. Springer, Cham., 2023; https://doi.org/10.1007/978-3-031-24475-9_6
*Iavich, M.; Post-quantum Scheme with the Novel Random Number Generator with the Corresponding Certification Method; In: Hu, Z., Wang, Y., He, M. (eds); Advances in Intelligent Systems, Computer Science and Digital Economics IV. CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 158. Springer, Cham., 2023; https://doi.org/10.1007/978-3-031-24475-9_7
*Iavich, M., Sharvadze, L.; The Model of the Novel One Windows Secure Clinic Management Systems; In: Hu, Z., Wang, Y., He, M. (eds); Advances in Intelligent Systems, Computer Science and Digital Economics IV. CSDEIS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 158. Springer, Cham.; 2023; https://doi.org/10.1007/978-3-031-24475-9_29
*Iavich, M., Akhalaia, G., Bocu, R.; Device Tracking Threats in 5G Network; In: Barolli, L. (eds); Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 655. Springer, Cham.; 2023; https://doi.org/10.1007/978-3-031-28694-0_46
*Iavich, M., Kuchukhidze, T., Bocu, R. (2023). A Post-quantum Cryptosystem with a Hybrid Quantum Random Number Generator. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 654. Springer, Cham. https://doi.org/10.1007/978-3-031-28451-9_32
*Iavich, M., Gnatyuk, S., Iashvili, G., Odarchenko, R., Simonov, S. (2023). 5G Security Function and Its Testing Environment. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_39
*Iavich, M., Iashvili, G., Odarchenko, R., Gnatyuk, S., Gagnidze, A. (2023). Developing Security Recommender System Using Content-Based Filtering Mechanisms. In: Faure, E., Danchenko, O., Bondarenko, M., Tryus, Y., Bazilo, C., Zaspa, G. (eds) Information Technology for Education, Science, and Technics. ITEST 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-031-35467-0_37
*Gorlov, L.; Iavich, M.; Bocu, R. Linear Layer Architecture Based on Cyclic Shift and XOR. Symmetry 2023, 15, 1496. https://doi.org/10.3390/sym15081496
*Tvalavadze, T., Gigashvili, K., Mania, E., Iavich, M. (2023). Automated Dating of Galaktion Tabidze’s Handwritten Texts. In: Hu, Z., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education VI. ICCSEEA 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-031-36118-0_23
*Iavich, M. (2023). Machine Learning Based Function for 5G Working with CPU Threads. In: Hu, Z., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education VI. ICCSEEA 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 181. Springer, Cham. https://doi.org/10.1007/978-3-031-36118-0_52
*Ziro , Toibayeva S., Gnatyuk S., Imanbayev A., Iavich M., Zhaybergenova Zh., "Research of the Information Security Audit System in Organizations," 2023 IEEE International Conference on Smart Information Systems and Technologies (SIST), Astana, Kazakhstan, 2023, pp. 440-444, doi: 10.1109/SIST58284.2023.10223557.
*Gagnidze A., Iavich M., Iashvili G., Magraqvelidze D., Okhrimenko T.; Correlation of Bitcoin Price and S&P 500 Company Index; Vol-3504, Proceedings of the Workshop on Classic, Quantum, and Post-Quantum Cryptography (CQPC 2023) co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023. https://ceur-ws.org/Vol-3504/
*Odarchenko, R.; Iavich, M.; Iashvili, G.; Fedushko, S.; Syerov, Y. Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers. Big Data Cogn. Comput.2023, 7, 169. https://doi.org/10.3390/bdcc7040169
*Bibiluri N., Surguladze G., Tsaava G., Bibiluri M., Iavich M.; Global processes of economy`s sustainable development, information society, systems and technologies; Conflict Management in Global Information Networks - CMiGiN 2022. CEUR, Vol-3530, pp. 224-234. https://ceur-ws.org/Vol-3530/
*Akhalaia G., Iavich M., Iashvili G., Prysiazhnyy D., Smirnova T.; Secure Encrypted Connection on Georgian Website; Cybersecurity Providing in Information and Telecommunication Systems II 2023. CEUR, Vol-3550, pp. 313–320. https://ceur-ws.org/Vol-3550/
*Iavich M., Kuchukhidze T., Okhrimenko T.; Verkle Tree-based Post-Quantum Digital Signature Scheme using Stateless Updatable Vector Commitment; Cybersecurity Providing in Information and Telecommunication Systems II 2023. CEUR, Vol-3550, pp. 157–166. https://ceur-ws.org/Vol-3550/
*Iavich M., Kuchukhidze T.; Digital Signature Design Using Verkle Tree; Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023). CEUR, Vol-3575, pp. 83-91. https://ceur-ws.org/Vol-3575/
*Iashvili G., Iavich M.; Enhancing Cyber Intelligence Capabilities through Process Automation: Advantages and Opportunities; Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023). CEUR, Vol-3575, pp. 92-101. https://ceur-ws.org/Vol-3575/
*Akhalaia G., Iavichi M.; High-Band Related Threats in 5G Network; Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023). CEUR, Vol-3575, pp. 132-140. https://ceur-ws.org/Vol-3575/
*Iavich M., Simonov S.; Utilizing the «MouseJack» Vulnerability in Physical Assessments; Proceedings of the 28th International Conference on Information Society and University Studies (IVUS 2023). CEUR, Vol-3575, pp. 364-371. https://ceur-ws.org/Vol-3575/
*Iavich, M.; Kuchukhidze, T.; Bocu, R. A Post-Quantum Digital Signature Using Verkle Trees and Lattices. Symmetry 2023, 15, 2165. https://doi.org/10.3390/sym15122165
*Proskurin D., Gnatyuk S., Okhrimenko T., Iavich M.; "ML-Based Cryptographic Keys Quality Assessment for 5G / 6G Networks Privacy and Security," 2023 IEEE 12th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Dortmund, Germany, 2023, pp. 1025-1030, doi: 10.1109/IDAACS58523.2023.10348795..
*Iavich , Sharvadze L.; The Efficient and Secure Digital Management System for Radiologists, pp.475 – 484 DOI10.3233/ATDE231359 Category Research Article Series Advances in Transdisciplinary Engineering Ebook Volume 48: Artificial Intelligence, Medical Engineering and Education
*Svanadze , Iavich M.; Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet; CPITS 2024 Cybersecurity Providing in Information and Telecommunication Systems 2024; CEUR, Vol-3654, pp. 520–525. https://ceur-ws.org/Vol-3654/
*Svanadze V., Iavich M., Gnatyuk S.; Challenges and Solutions for Cybersecurity and Information Security Management in Organizations; CPITS 2024 Cybersecurity Providing in Information and Telecommunication Systems 2024; Vol-3654, pp. 497–504. https://ceur-ws.org/Vol-3654/
*Iavich, M.; Kuchukhidze, T. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. Cryptography 2024, 8, 15. https://doi.org/10.3390/cryptography8020015
*Iavich, M., Odarchenko, R. (2024). Automated Penetration Testing in 5G Networks. In: Nechyporuk, M., Pavlikov, V., Krytskyi, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2023. ICTM 2023. Lecture Notes in Networks and Systems, vol 996. Springer, Cham. https://doi.org/10.1007/978-3-031-60549-9_33
*Bocu, Iavich M.; Enhanced detection of low-rate DDoS attack patterns using machine learning models, Journal of Network and Computer Applications, Volume 227, 2024, 103903, ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2024.103903. (https://www.sciencedirect.com/science/article/pii/S1084804524000808)
*Amirkhanova, D.S.; Iavich, M.; Mamyrbayev, O. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles. Cryptography 2024, 8, 31. https://doi.org/10.3390/cryptography8030031
*Iavich M., Simonovi S., Okhrimenko T.; Cryptography as a dual-faceted instrument of security and vulnerability (short paper); Cybersecurity Providing in Information and Telecommunication Systems II 2024; CEUR, Vol-3826, 378–384; https://ceur-ws.org/Vol-3826
*Iavich M., Gnatyuk S., Mukasheva A.; Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience (short paper); Cybersecurity Providing in Information and Telecommunication Systems II 2024; CEUR, Vol-3826, 342–349; https://ceur-ws.org/Vol-3826
*Proskurin, Iavich M., Okhrimenko T., Chukwukaelonma O., Hryniuk T.; Predicting pseudo-random number generator output with sequential analysis; Cyber Security and Data Protection 2024; CEUR, Vol-3800, pp.42-57, Link: https://ceur-ws.org/Vol-3800
*Tvalavadze , Ghadua I., Kalandadze G., Iavich M.; Signature-based manual dating vs. neural network automation (short paper); Cyber Security and Data Protection 2024; CEUR, Vol-3800, pp.123-130, Link: https://ceur-ws.org/Vol-3800
*Iavich, Kovalchuk O., Gnatyuk S., Khavikova Y., Sokolov V.; Classical and post-quantum encryption for GDPR; Classic, Quantum, and Post-Quantum Cryptography 2024; CEUR, Vol-3829, pp. 70-78; link: https://ceur-ws.org/Vol-3829/
*Iavich ; The evolution of digital signatures: From classical to post-quantum; Classic, Quantum, and Post-Quantum Cryptography 2024; CEUR, Vol-3829, pp. 32-38; link: https://ceur-ws.org/Vol-3829/
*Shilinh , Iavich M.; Modeling the processes of a mentorship assistance information system based on linguistic features of requests; Social Communication and Information Activity in Digital Humanities 2024; CEUR, Vol-3851; link: https://ceur-ws.org/Vol-3851/
*Iavich, Simonov S., Gnatyuk S.; Building C2 servers for the assessment of AI based antiviruses; Social Communication and Information Activity in Digital Humanities 2024; CEUR, Vol-3851; Link: https://ceur-ws.org/Vol-3851/
*Iavich M, Kevanishvili Z.; Detecting Fair Play Violations in Chess Using Neural Networks; Information Society and University Studies 2024 (IVUS 2024); CEUR, Vol-3885, pp.121-127; link: https://ceur-ws.org/Vol-3885/
*Iavich, Ninidze M.; Advancements in Dating Undated Manuscripts through Dual Methodologies; Information Society and University Studies 2024 (IVUS 2024); CEUR, Vol-3885, pp.79-88; link: https://ceur-ws.org/Vol-3885/
*Iavich , Akhalaia G., Odarchenko R., Imnadze A.; Fortifying the digital fortress: A multi-layered defense strategy with SIEM, mail gateway, and sandbox technologies; Algorithms of Data Processing 2024; CEUR, Vol-3895, pp.216-226; link: https://ceur-ws.org/Vol-3895/
*Iavich M., Gnatyuk S., Kuchukhidze T., Iashvili G.; Balancing security and efficiency in deterministic random bit generators for post-quantum cryptography; CH&CMiGIN 2024 - Cyber Hygiene & Conflict Management in Global Information Networks 2024; CEUR, Vol-3925, pp. 265-272; Link: https://ceur-ws.org/Vol-3925
*Zakutynskyi, Kalishuk O., Iavich M., Nabylytsia V., Yehunko V.; AI-based user identification method for web services; CH&CMiGIN 2024 - Cyber Hygiene & Conflict Management in Global Information Networks 2024; CEUR, Vol-3925, pp. 143-154; Link: https://ceur-ws.org/Vol-3925/
*Iavich, M., Kevanishvili, Z. (2025). A Neural Network Approach to Chess Cheat Detection. In: Lopata, A., Gudonienė, D., Butkienė, R., Čeponis, J. (eds) Information and Software Technologies. ICIST 2024. Communications in Computer and Information Science, vol 2401. Springer, Cham. https://doi.org/10.1007/978-3-031-84263-4_12
*Iavich, M., Ninidze, M.; Dating the Undated Manuscripts Manually and Automatically; In: Lopata, A., Gudonienė, D., Butkienė, R., Čeponis, J. (eds) Information and Software Technologies. ICIST 2024. Communications in Computer and Information Science, vol 2401.; 2025; Springer, Cham. https://doi.org/10.1007/978-3-031-84263-4_17
*Iavich, M.; Kapalova, N.; Asymmetric Post-Quantum Digital Signature Scheme with k-ary Verkle Trees; Symmetry 2025; 17, 437. https://doi.org/10.3390/sym17030437
*Iavich, M.; Kapalova, N.; Optimizing Post-Quantum Digital Signatures with Verkle Trees and Quantum Seed-Based Pseudo-Random Generators; Computers 2025, 14, 103. https://doi.org/10.3390/computers14030103
*Odarchenko, R., Iavich, M., & Pinchuk, A. (2025). Development of a method for automated 5G and beyond network slices penetration testing. Radioelectronic and Computer Systems, 2025(1), 248-263. doi:https://doi.org/10.32620/reks.2025.1.17
* Iavich, M.; Kuchukhidze, T.; Bocu, R. Post-Quantum Digital Signature: Verkle-Based HORST. J. Cybersecur. Priv. 2025, 5, 28. https://doi.org/10.3390/jcp5020028
*Yavich, M., Sabina, K., & Nurzhas, K. (2025). A comprehensive approach to cyber threats: Analysis of suspicious profiles and protection of web applications. International Journal of Research Publication and Reviews, 6(5), 13083–13088. https://ijrpr.com/uploads/V6ISSUE5/IJRPR46498.pdf
*Maksim Iavich, Dana Amirkhanova Sairangazhykyzy. Post-quantum Digital Signatures using ElGamal Approach, International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.3, pp.89-108, 2025. DOI:10.5815/ijcnis.2025.03.06
*Pacurar, C.M.; Bocu, R.; Iavich, M. An Analysis of Existing Hash-Based Post-Quantum Signature Schemes. Symmetry 2025, 17, 919. https://doi.org/10.3390/sym17060919
*Iavich M. Combating Fake News with Cryptography in Quantum Era with Post-Quantum Verifiable Image Proofs. Journal of Cybersecurity and Privacy. 2025; 5(2):31. https://doi.org/10.3390/jcp5020031
*Iavich, M., & Odarchenko, R. (2025). A novel hybrid method. In Advancements in Cybersecurity: Next‑Generation Systems and Applications (Vol. 1). Springer.
Kerimbayeva, A.; Iavich, M.; Begimbayeva, Y.; Gnatyuk, S.; Tynymbayev, S.; Temirbekova, Z.; Ussatova, O. A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature. Information 2025, 16, 564. https://doi.org/10.3390/info16070564
Svanadze, Vladimer, Maksim Iavich, and Viktor Lukashenko. “Geopolitical and Technical Dimensions of Internet Fragmentation.” CEUR Workshop Proceedings, vol. 3991, 2025, https://ceur-ws.org/Vol-3991/short3.pdf.
Iavich, Maksim, Sergiy Gnatyuk, Sergei Simonov, and Viktoriia Sydorenko. “Taking LOLBAS Hacking to Another Level—Stealing Passwords Using Built-in Binaries.” CEUR Workshop Proceedings, vol. 3991, 2025, https://ceur-ws.org/Vol-3991/short2.pdf
Svanadze, Vladimer, Maksim Iavich, and Viktor Lukashenko.“Geopolitical and Technical Dimensions of Internet Fragmentation.” CEUR Workshop Proceedings, vol. 3991, 2025, https://ceur-ws.org/Vol-3991/short3.pdf.
Maksim Iavich, Tamari Kuchukhidze, Razvan Bocu, "A Novel Verkle Tree-based Post-quantum Digital Signature System with Enhanced Random Number Generation", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.4, pp.19-36, 2025. DOI:10.5815/ijcnis.2025.04.02
Iavich, M.; Kapalova, N.; Sakan, K. Efficient Lattice-Based Digital Signatures for Embedded IoT Systems. Symmetry2025, 17, 1522. https://doi.org/10.3390/sym17091522
Iavich, M, Post-quantum Verkle signature scheme with SHAKE-based deterministic randomness and quantum entropy; Cyber Hygiene & Conflict Management in Global Information Networks 2025, p. 49-58. https://ceur-ws.org/Vol-4024/paper05.pdf
Zhaxygulova, D.; Iavich, M.; Rakhmetullina, S.; Alipbayev, K. Secure and Energy-Aware Cryptographic Framework for IoT-Enabled UAV Systems. Symmetry 2025, 17, 1987. https://doi.org/10.3390/sym17111987
Kevanishvili, Z.; Iavich, M. A Hybrid Human-Centric Framework for Discriminating Engine-like from Human-like Chess Play: A Proof-of-Concept Study. Appl. Syst. Innov. 2026, 9, 11. https://doi.org/10.3390/asi9010011
Iavich, T. Kuchukhidze and R. Bocu, "Fractional Verkle Trees for Scalable Post-Quantum Signatures," in IEEE Access, doi: 10.1109/ACCESS.2025.3640288.
Maksim Iavich and Giorgi Iashvili Privacy-preserving security operations: Bridging the conformance gap between SOC efficiency and GDPR compliance. In Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II-2025) (CEUR Workshop Proceedings, Vol. 4145, paper 18). CEUR-WS.org. https://ceur-ws.org/Vol-4145/paper18.pdf
Iavich, M.; Svanadze, V.; Kovalchuk, O. A Deterministic, Rule-Based Framework for Detecting Anomalous IP Packet Fragmentation. Future Internet 2026, 18, 19. https://doi.org/10.3390/fi18010019
Odarchenko, R., Iavich, M., Iashvili, G., & Gagnidze, A. (2026). 5G network security. In Handbook of Cybersecurity (Ch. 8). Taylor & Francis. https://doi.org/10.1201/9781003640790-8
Razvan Bocu, Maksim Iavich, Generalized detection of DDoS attack patterns using machine learning models, Journal of Network and Computer Applications, Volume 248, 2026, 104441, ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2026.104441.
Iavich, M.; Kuchukhidze, T.; Lopata, A. Static Analysis Techniques for Embedded, Cyber-Physical, and Electronic Software Systems: A Comprehensive Survey. Electronics 2026, 15, 918. https://doi.org/10.3390/electronics15050918