default search action
CPITS II 2021: Kyiv, Ukraine
- Anatoly Bessalov, Dmytro Ageyev, Valeriy Lahno, Volodymyr Sokolov:
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), Kyiv, Ukraine, October 26, 2021 (online). CEUR Workshop Proceedings 3188, CEUR-WS.org 2022 - Igor Zhukov, Oleksii Synelnikov, Olena Chaikovska, Serhiy Dorozhynskyi:
Modern Approaches to Software Optimization Methods. 1-10 - Oleksandr Tereshchenko, Natalia Trintina:
Development Principles of Secure Microservices. 11-20 - Euvgenia Nosova, Lyudmyla Anisimova, Tetiana Murovana, Yulia Sviatiuk, Olena Iafinovych:
Information Security System in Provision of the Economic Security and Risk Management of the Enterprise. 21-31 - Mykyta Moshenchenko, Bohdan Zhurakovskyi, Vadym Poltorak, Andrii Bondarchuk, Nataliia Korshun:
Optimization Algorithms of Smart City Wireless Sensor Network Control. 32-42 - Mariia Nazarkevych, Volodymyr V. Hrytsyk, Maryna Kostiak, Lyubomyr Parkhuts, Hanna Nazarkevych:
Biometric Protection Information System with Extension of Segmentation Methods. 43-52 - Oleksandr Trush, Mariy Trush, Oleh Shincaruk, Hryhorii Radzivilov, Tetiana S. Opryshko:
Аnalysis of Corporate Culture Development Parameters in the Telecommunication Enterprise Informations. 53-62 - Iryna Kreidych, leksandr Kharchenko, Oksana Kazak:
Solvency Management in the Financial Security System of Housing and Communal Services. 63-75 - Vyktoriia Marhasova, Stanislav Maliar, Mukola Ivanov, Olga Garafonova, Olena Kozyrieva:
IT Team Building Process Management based on a Competency Approach. 76-87 - Maryna Chyzhevska, Nataliia Romanovska, Andrii Ramskyi, Vitalii Venger, Mykola Obushnyi:
Behavioral Biometry as a Cyber Security Tool. 88-97 - Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Ievgeniia Kuzminykh, Amal Mersni:
Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning. 98-107 - Roman Bybyk, Ivan Opirskyy, Mike McIntosh:
SDR Receivers as a New Challenge to Cybersecurity Wireless Technology. 108-119 - Alexandr Kuznetsov, Yaroslav Derevianko, Nikolay Poluyanenko, Oleksandr Bagmut:
Particle Swarm Optimization based on S-Boxes Generation. 120-134 - Denis Berestov, Oleg Kurchenko, Yuri Shcheblanin, Volodymyr Mishchenko, Nataliia Mazur:
Synthesis of the System of Iterative Dynamic Risk Assessment of Information Security. 135-148 - Sergiy Gnatyuk, Rat Berdibayev, Andriy Fesenko, Olha Kyryliuk, Anatoly Bessalov:
Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare. 149-166 - Serhii Buchyk, Nataliia Lukova-Chuiko, Serhii Toliupa, Vitalii Piatyhor, Oleksandr Buchyk:
Diceware Password Generation Algorithm Modification based on Pseudo-Random Sequences. 167-176 - Victor Krasnobayev, Alexander Kuznetsov, Mykhaylo Bagmut, Ludmila Gorbacheva, Tetiana Kuznetsova:
Method of Tabular Implementation for Diagnostics of Non-Positional Code Structures in the System of Residual Classes. 177-186 - Mariia Nazarkevych, Volodymyr V. Hrytsyk, Anzhela Kuza, Oleksii Shevchuk, Maryna Kostiak:
The Impact of the Covid-19 Pandemic on Students Studying in High Education Institutions. 187-196 - Viktor Grechaninov, Hennadii Hulak, Evgen Hulak, Pavlo Skladannyi, Volodymyr Sokolov:
Decentralized Access Demarcation System Construction in Situational Center Network. 197-206 - Kateryna Kraus, Nataliia Kraus:
Practice of Application of Latest Digital Technologies (short paper). 207-213 - Eleonora Tereshchenko, Olga Sosnovska, Natalya Ushenko, Viktoriya Andryeyeva, Mariia Kovalova:
Risk Assessment Information System of Enterprise Business Processes (short paper). 214-220 - Anatolii Sunduk, Yuliia Zhukova, Pavlo Shvets, Valeriia Loiko:
Economic Security Parameters in the Conditions of Increasing Information Risks and Threats (short paper). 221-228 - Sviatoslav Vasylyshyn, Ivan Opirskyy, Svitlana Shevchenko:
Honeypot Security Efficiency versus Deception Solution (short paper). 229-236 - Larysa Hatsenko, Sergey Herasimov, Serhii Pohasii:
Investigation of the Effect of Harmonic Interference on the Error with Frequency Conversion of Energy Supply Systems on Water Transport Vehicles (short paper). 237-243 - Tetiana Moiseienko, Anastasiia Kiva:
Cybersecurity Startup Investments (short paper). 244-250 - Vasyl Ustimenko, Oleksandr Pustovit:
Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper). 251-256 - Zoreslava Brzhevska, Roman Kyrychok, Andrii Anosov, Pavlo Skladannyi, Maksym Vorokhob:
Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact (short paper). 257-264 - Larysa Kriuchkova, Maksym Vovk, Ivan Tsmokanych, Denys Tarasenko:
Parameters of Aiming Interfering Signals for Information Protection from Leaks by High-Frequency Channel Imposition (short paper). 265-272 - Vasyl Buhas, Ihor Ponomarenko, Vlriy Bugas, Andrii Ramskyi, Volodymyr Sokolov:
Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity (short paper). 273-281 - Pavlo Anakhov, Viktoriia Zhebka, Nataliia Korshun, Alina Tushych, Tymur Dovzhenko:
Stability Method of Connectivity Automated Calculation for Heterogeneous Telecommunication Network (short paper). 282-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.