default search action
CPITS II 2023: Virtual Event / Kyiv, Ukraine
- Volodymyr Sokolov, Tamara Radivilova, Vasyl Ustimenko, Mariya Nazarkevych:
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), Kyiv, Ukraine, October 26, 2023 (online). CEUR Workshop Proceedings 3550, CEUR-WS.org 2023 - Denis Berestov, Oleg Kurchenko, Lyudmyla Zubyk, Serhii Kulibaba, Nataliia Mazur:
Assessment of Weather Risks for Agriculture using Big Data and Industrial Internet of Things Technologies. 1-13 - Bohdan Leshchenko, Tetiana A. Vakaliuk, Andrii Yefimenko, Viacheslav Osadchyi, Dmytro Antoniuk:
Model of a Subsystem for Securing E-Mail Against Loss using Mail Transport Agents based on Containerized Environments. 14-28 - Olha Mykhaylova, Taras Fedynyshyn, Anastasiia Datsiuk, Bohdan Fihol, Hennadii Hulak:
Mobile Application as a Critical Infrastructure Cyberattack Surface. 29-43 - Oleksandr Kuznetsov, Emanuele Frontoni, Viktor Katrich, Olena Kobylianska, Svetlana Pshenichnaya:
A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management. 44-54 - Oleksandr Vakhula, Ivan Opirskyy, Olha Mykhaylova:
Research on Security Challenges in Cloud Environments and Solutions based on the "Security-as-Code" Approach. 55-69 - Kateryna Kolbasova, Bohdan Zhurakovskyi, Vadym Poltorak, Volodymyr Nakonechnyi, Roman Kyrychok:
Smart Home Network based on Cisco Equipment. 70-80 - Oleksandr Kuznetsov, Oleksandr Peliukh, Nikolay Poluyanenko, Serhii Bohucharskyi, Ievgeniia Kolovanova:
Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems. 81-94 - Danyil Zhuravchak, Anastasiia Tolkachova, Andrian Piskozub, Valerii Dudvkevych, Nataliia Korshun:
Monitoring Ransomware with Berkeley Packet Filter. 95-106 - Vasyl Ustimenko, Oleksandr Pustovit:
Families of Stream Ciphers based on Non-Bijective Multivariate Encryption Maps of High Degree. 107-120 - Vadym Poltorak, Bohdan Zhurakovskyi, Volodymyr Saiko, Tamara Loktikova, Olena Nesterova:
Remote Object Confidential Control Technology based on Elliptic Cryptography. 121-130 - Serhii Toliupa, Anatolii Shevchenko, Serhii Buchyk, Ihor Pampukha, Andrii Kulko:
Managing the Security of the Critical Infrastructure Information Network. 131-142 - Vasyl Poberezhnyk, Valeriia Balatska, Ivan Opirskyy:
Development of the Learning Management System Concept based on Blockchain Technology. 143-156 - Maksim Iavich, Tamari Kuchukhidze, Tetiana Okhrimenko:
Verkle Tree-based Post-Quantum Digital Signature Scheme using Stateless Updatable Vector Commitment. 157-166 - Sergiy Gnatyuk, Dauriya Zhaksigulova, Oksana Zhyharevych, Dinara Ospanova, Iryna Chuba:
Studies on WSN Models for IoT-based Monitoring Systems in the Critical Infrastructure of the State. 167-180 - Stanislav Yarotskiy, Viktoriia Sydorenko, Anzhela Lelechenko, Olena Kolisnyk, Artem Polozhentsev:
Method of Determining the Importance Factor of IT Security Projects Investment Attractiveness in Critical Infrastructures. 181-190 - Volodymyr V. Hrytsyk, Olexii Babii, Mariia Nazarkevych, Vitaliy Chubaievsyi, Volodymyr Astapenya:
Prospects and Applications of Quantum Technologies (short paper). 191-199 - Volodymyr Malyukov, Valery Lakhno, Bohdan Bebeshko, Inna Malyukova, Mereke Zhumadilova:
Multifactor Model of the Digital Cryptocurrency Market as a Computational Core of the Information System (short paper). 200-208 - Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Serhii Smirnov:
Modeling Attacks on the DHCP Protocol in the GNS3 Environment and Determining Methods of Security Against Them (short paper). 209-216 - Denys Shevchuk, Oleh Harasymchuk, Andrii Partyka, Nataliia Korshun:
Designing Secured Services for Authentication, Authorization, and Accounting of Users (short paper). 217-225 - Anna Ilyenko, Sergii Ilyenko, Olena Prokopenko, Hennadii Hulak, Iryna Melnyk:
Practical Aspects of Using Fully Homomorphic Encryption Systems to Protect Cloud Computing (short paper). 226-233 - Serhii Abramov, Anatoly Bessalov, Volodymyr Sokolov:
Properties of Isogeny Graph of Non-Cyclic Edwards Curves (short paper). 234-239 - Pavlo Anakhov, Viktoriia Zhebka, Svitlana Popereshnyak, Pavlo Skladannyi, Volodymyr Sokolov:
Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper). 240-245 - Sergii Kavun, Ruslana Levkina, Yana Kotko, Dmytro Levkin, Artur Levkin:
Information Security in Project Management for the Financial and Budgetary Capacity of the National Economy (short paper). 246-254 - Sergii Kavun, Dmytro Levkin, Artur Levkin, Yana Kotko, Ruslana Levkina:
Methods of Mathematical Programming for Designing a Safe Environment for Bioobject (short paper). 255-260 - Larysa Kriuchkova, Ivan Tsmokanych, Svitlana Shevchenko, Oleksandr Bohdanov, Nataliia Mazur:
Experimental Research of the Parameters of Danger and Protective Signals Attached to High-Frequency Imposition (short paper). 261-268 - Pavlo Anakhov, Viktoriia Zhebka, Vladislav Kravchenko, Pavlo Skladannyi, Oleksii Zhyltsov:
Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir (short paper). 269-274 - Nadiia Dovzhenko, Oleg Barabash, Nataliia Ausheva, Yevhen Ivanichenko, Sergiy Obushnyi:
Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing (short paper). 275-280 - Yurii Myshkovskyi, Mariia Nazarkevych:
Robustness of Fingerprint Liveness Detection based on Convolutional Neural Networks (short paper). 281-288 - Anatoly Shcherba, Emil Faure, Artem Skutskyi, Oleksandr Kharin:
Families of Square Commutative 2х2 Matrices (short paper). 289-296 - Svitlana Shevchenko, Yuliia Zhdanova, Halina Shevchenko, Olena Nehodenko, Svitlana Spasiteleva:
Information Security Risk Management using Cognitive Modeling (short paper). 297-305 - Emil Faure, Anatoly Shcherba, Artem Skutskyi, Artem Lavdanskyi:
A Finite Field of Square Matrices of Order 2 (short paper). 306-312 - Giorgi Akhalaia, Maksim Iavich, Giorgi Iashvili, Dmytro Prysiazhnyy, Tetiana Smirnova:
Secure Encrypted Connection on Georgian Website (short paper). 313-320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.