default search action
CPITS II 2024: Virtual Event / Kyiv, Ukraine
- Volodymyr Sokolov, Vasyl Ustimenko, Tamara Radivilova, Mariya Nazarkevych:
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, Kyiv, Ukraine, October 26, 2024 (online). CEUR Workshop Proceedings 3826, CEUR-WS.org 2024 - Mykhailo Kotenko, Dmytro Moskalyk, Valeriia Kovach, Viacheslav Osadchyi:
Navigating the challenges and best practices in securing microservices architecture. 1-16 - Ivan Tyshyk, Hennadii Hulak:
Testing an organization's information system for unauthorized access. 17-29 - Olha Mykhaylova, Marta Korol, Roman Kyrychok:
Research and analysis of issues and challenges in ensuring cyber security in cloud computing. 30-39 - Emil Faure, Alimzhan Baikenov, Artem Skutskyi, Denys Faure, Olga Abramkina:
Algorithms for reliable permutation transmission protocols in noisy communication channels. 40-49 - Valeriia Balatska, Ivan Opirskyy, Nataliia Slobodian:
Blockchain for enhancing transparency and trust in government registries. 50-59 - Petro Petriv, Ivan Opirskyy, Nataliia Mazur:
Modern technologies of decentralized databases, authentication, and authorization methods. 60-71 - Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Svitlana Shevchenko:
Universal centralized secret data management for automated public cloud provisioning. 72-81 - Oleksandr Kuznetsov, Yelyzaveta Kuznetsova, Emanuele Frontoni, Marco Arnesano, Oleksii Smirnov:
Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application. 82-93 - Oleksandr Kuznetsov, Anton Yezhov, Kateryna Kuznetsova, Vladyslav Yusiuk, Valentyn Chernushevych:
Enhancing blockchain scalability through zero-knowledge proofs: A novel block finality system for near protocol. 94-104 - Hryhorii Hnatiienko, Oleksii Hnatiienko, Tetiana Babenko, Larysa Myrutenko:
Mathematical models and methods for decision coordination in critical infrastructure operations. 105-114 - Oksana Buinytska, Valeriia A. Smirnova, Tetiana Terletska, Liliia Varchenko-Trotsenko, Bohdan Hrytseliak:
Theoretical exploration of the design of the open university ecosystem and its security challenges within the realm of digital transformation. 115-128 - Yuliia Kostiuk, Pavlo Skladannyi, Nataliia Korshun, Bohdan Bebeshko, Karyna Khorolska:
Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network. 129-138 - Bayan Abduraimova, Sergiy Gnatyuk, Albina Nurmukhanbetova:
Comparative study of machine learning applications in malware forensics. 139-152 - Bohdan Leshchenko, Bohdan Snisar, Anton Stupak, Viacheslav Osadchyi:
Integrating DevSecOps into the software development lifecycle: A comprehensive model for securing containerized and cloud-native environments (short paper). 153-161 - Andrii Sahun, Vladyslav Khaidurov, Valerii Lakhno:
Evaluation of the accuracy of the neural network algorithm for object recognition in security systems (short paper). 162-167 - Oleksandr Korchenko, Yevheniia Ivanchenko, Ihor Ivanchenko, Yevhenii Pedchenko, Mari Petrovska:
The system of secured user's credentials transfer (short paper). 168-173 - Serhii Abramov, Volodymyr Sokolov, Vadym Abramov:
Research of the graphic model of the points of the elliptic curve in the Edward form (short paper). 174-181 - Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Valerii Kozachok:
Information classification framework according to SOC 2 Type II (short paper). 182-189 - Dmytrii Tykholaz, Roman Banakh, Lesya Mychuda, Andrian Piskozub, Roman Kyrychok:
Incident response with AWS detective controls (short paper). 190-197 - Vasyl Ustimenko, Oleksandr Pustovit:
On Schubert cells of projective geometry and pseudo-quadratic public keys of multivariate cryptography (short paper). 198-205 - Olha Mykhaylova, Taras Fedynyshyn, Artem Platonenko:
Hardcoded credentials in Android apps: Service exposure and category-based vulnerability analysis (short paper). 206-211 - Pavlo Vorobets, Oleksandr Vakhula, Andriy Horpenyuk, Nataliia Korshun:
Implementing post-quantum KEMs: Practical challenges and solutions (short paper). 212-219 - Volodymyr Khoma, Dmytro Sabodashko, Viktor Kolchenko, Pavlo Perepelytsia, Marek Baranowski:
Investigation of vulnerabilities in large language models using an automated testing system (short paper). 220-228 - Oleksandr Lavrynenko:
Method of speech signal scrambling based on matched wavelet filters (short paper). 229-235 - Nadiia Dovzhenko, Yevhen Ivanichenko, Pavlo Skladannyi, Oleksii Zhyltsov:
Research of UAV and sensor network integration features for routing optimization and energy consumption reduction (short paper). 236-241 - Mariia Nazarkevych, Victoria Vysotska, Yurii Myshkovskyi, Nazar Nakonechnyi, Andrii Nazarkevych:
Model for forecasting the development of information threats in the cyberspace of Ukraine (short paper). 242-250 - Larysa Kriuchkova, Ivan Tsmokanych, Nataliia Mazur, Denys Tarasenko, Viktoriia Osadcha:
Experimental determination of protective signal parameters for effective "swinging" of the carrier frequency of high-frequency imposition (short paper). 251-259 - Denys Bakhtiiarov, Bohdan Chumachenko, Oleksandr Lavrynenko, Volodymyr Chupryn, Veniamin V. Antonov:
Distribute load among concurrent servers (short paper). 260-266 - Bohdan Zhurakovskyi, Vadym Poltorak, Serhii Toliupa, Oleksandr Pliushch, Olena Nesterova:
Data protection in the automated agribusiness management system (short paper). 267-275 - Olena Kryvoruchko, Alona Desiatko, Ihor Karpunin, Svitlana Symonenko, Olena Furman:
Cybernetic cognitive model for describing the financial health of it gaming company (short paper). 276-281 - Valeriy Lakhno, Miroslav Lakhno, Olena Kryvoruchko, Serhii Kaminskyi, Vadym Makaiev:
Automation of DDoS attack investigation in industrial control systems using Bayesian networks on Python (short paper). 282-287 - Anton Zahynei, Yurii Shcheblanin, Oleg Kurchenko, Iryna Melnyk, Serhii Smirnov:
Analysis of identification and access management models in the context of fog computing (short paper). 288-293 - Oleh Bakaiev, Ihor Syvachenko, Viktor Shevchenko:
Scalarization of the vector criterion of information system survivability based on information security indicators (short paper). 294-300 - Svitlana Popereshnyak, Yuriy Novikov, Yuliia Zhdanova:
Cryptographic system security approaches by monitoring the random numbers generation (short paper). 301-309 - Svitlana Popereshnyak, Viktor Ovcharenko, Yuriy Novikov, Hennadii Hulak:
Detection of intrusions based on text analysis and machine learning methods in the development of information systems (short paper). 310-318 - Yuriy Syvytsky, Viktor Shevchenko:
Simulation model of information system transformation to increase survivability against cyber threats (short paper). 319-325 - Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Volodymyr Sokolov:
Method for managing IT incidents in critical information infrastructure facilities (short paper). 326-333 - Serhii Toliupa, Serhii Buchyk, Volodymyr Nakonechnyi, Mykola Brailovskyi, Serhii Shtanenko:
Design of security protection and management systems based on game theory (short paper). 334-341 - Maksim Iavich, Sergiy Gnatyuk, Assel Mukasheva:
Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience (short paper). 342-349 - Yurii Yaremchuk, Olha Saliieva, Vasyl Karpinets, Andrii Nikolaienko, Nataliia Kunanets:
Enhancing the steganographic resistance of hidden information to active attacks (short paper). 350-355 - Svitlana Shevchenko, Yuliia Zhdanova, Olha Kryvytska, Halyna Shevchenko, Svitlana Spasiteleva:
Fuzzy cognitive mapping as a scenario approach for information security risk analysis (short paper). 356-362 - Oleksandr Volotovskyi, Roman Banakh, Andrian Piskozub, Zoreslava Brzhevska:
Automated security assessment of Amazon Web Services accounts using CIS Benchmark and Python 3 (short paper). 363-371 - Viktoriia Zhebka, Oleksii Ananchenko, Kateryna Osadcha, Serhii Zhebka, Andrii Aronov:
Improving a machine learning method for an automated control system (short paper). 372-377 - Maksim Iavich, Sergei Simonov, Tetiana Okhrimenko:
Cryptography as a dual-faceted instrument of security and vulnerability (short paper). 378-384 - Andrii Shevchenko, Pylyp Prystavka:
Enhancement of convolution operation performance using SIMD of AArch64 (short paper). 385-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.