default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2024
- Bayan Abduraimova, Sergiy Gnatyuk, Albina Nurmukhanbetova:
Comparative study of machine learning applications in malware forensics. CPITS II 2024: 139-152 - Serhii Abramov, Volodymyr Sokolov, Vadym Abramov:
Research of the graphic model of the points of the elliptic curve in the Edward form (short paper). CPITS II 2024: 174-181 - Oleh Bakaiev, Ihor Syvachenko, Viktor Shevchenko:
Scalarization of the vector criterion of information system survivability based on information security indicators (short paper). CPITS II 2024: 294-300 - Denys Bakhtiiarov, Bohdan Chumachenko, Oleksandr Lavrynenko, Volodymyr Chupryn, Veniamin V. Antonov:
Distribute load among concurrent servers (short paper). CPITS II 2024: 260-266 - Valeriia Balatska, Ivan Opirskyy, Nataliia Slobodian:
Blockchain for enhancing transparency and trust in government registries. CPITS II 2024: 50-59 - Oksana Buinytska, Valeriia A. Smirnova, Tetiana Terletska, Liliia Varchenko-Trotsenko, Bohdan Hrytseliak:
Theoretical exploration of the design of the open university ecosystem and its security challenges within the realm of digital transformation. CPITS II 2024: 115-128 - Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Valerii Kozachok:
Information classification framework according to SOC 2 Type II (short paper). CPITS II 2024: 182-189 - Nadiia Dovzhenko, Yevhen Ivanichenko, Pavlo Skladannyi, Oleksii Zhyltsov:
Research of UAV and sensor network integration features for routing optimization and energy consumption reduction (short paper). CPITS II 2024: 236-241 - Emil Faure, Alimzhan Baikenov, Artem Skutskyi, Denys Faure, Olga Abramkina:
Algorithms for reliable permutation transmission protocols in noisy communication channels. CPITS II 2024: 40-49 - Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Volodymyr Sokolov:
Method for managing IT incidents in critical information infrastructure facilities (short paper). CPITS II 2024: 326-333 - Hryhorii Hnatiienko, Oleksii Hnatiienko, Tetiana Babenko, Larysa Myrutenko:
Mathematical models and methods for decision coordination in critical infrastructure operations. CPITS II 2024: 105-114 - Maksim Iavich, Sergiy Gnatyuk, Assel Mukasheva:
Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience (short paper). CPITS II 2024: 342-349 - Maksim Iavich, Sergei Simonov, Tetiana Okhrimenko:
Cryptography as a dual-faceted instrument of security and vulnerability (short paper). CPITS II 2024: 378-384 - Volodymyr Khoma, Dmytro Sabodashko, Viktor Kolchenko, Pavlo Perepelytsia, Marek Baranowski:
Investigation of vulnerabilities in large language models using an automated testing system (short paper). CPITS II 2024: 220-228 - Oleksandr Korchenko, Yevheniia Ivanchenko, Ihor Ivanchenko, Yevhenii Pedchenko, Mari Petrovska:
The system of secured user's credentials transfer (short paper). CPITS II 2024: 168-173 - Yuliia Kostiuk, Pavlo Skladannyi, Nataliia Korshun, Bohdan Bebeshko, Karyna Khorolska:
Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network. CPITS II 2024: 129-138 - Mykhailo Kotenko, Dmytro Moskalyk, Valeriia Kovach, Viacheslav Osadchyi:
Navigating the challenges and best practices in securing microservices architecture. CPITS II 2024: 1-16 - Larysa Kriuchkova, Ivan Tsmokanych, Nataliia Mazur, Denys Tarasenko, Viktoriia Osadcha:
Experimental determination of protective signal parameters for effective "swinging" of the carrier frequency of high-frequency imposition (short paper). CPITS II 2024: 251-259 - Olena Kryvoruchko, Alona Desiatko, Ihor Karpunin, Svitlana Symonenko, Olena Furman:
Cybernetic cognitive model for describing the financial health of it gaming company (short paper). CPITS II 2024: 276-281 - Oleksandr Kuznetsov, Yelyzaveta Kuznetsova, Emanuele Frontoni, Marco Arnesano, Oleksii Smirnov:
Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application. CPITS II 2024: 82-93 - Oleksandr Kuznetsov, Anton Yezhov, Kateryna Kuznetsova, Vladyslav Yusiuk, Valentyn Chernushevych:
Enhancing blockchain scalability through zero-knowledge proofs: A novel block finality system for near protocol. CPITS II 2024: 94-104 - Valeriy Lakhno, Miroslav Lakhno, Olena Kryvoruchko, Serhii Kaminskyi, Vadym Makaiev:
Automation of DDoS attack investigation in industrial control systems using Bayesian networks on Python (short paper). CPITS II 2024: 282-287 - Oleksandr Lavrynenko:
Method of speech signal scrambling based on matched wavelet filters (short paper). CPITS II 2024: 229-235 - Bohdan Leshchenko, Bohdan Snisar, Anton Stupak, Viacheslav Osadchyi:
Integrating DevSecOps into the software development lifecycle: A comprehensive model for securing containerized and cloud-native environments (short paper). CPITS II 2024: 153-161 - Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Svitlana Shevchenko:
Universal centralized secret data management for automated public cloud provisioning. CPITS II 2024: 72-81 - Olha Mykhaylova, Taras Fedynyshyn, Artem Platonenko:
Hardcoded credentials in Android apps: Service exposure and category-based vulnerability analysis (short paper). CPITS II 2024: 206-211 - Olha Mykhaylova, Marta Korol, Roman Kyrychok:
Research and analysis of issues and challenges in ensuring cyber security in cloud computing. CPITS II 2024: 30-39 - Mariia Nazarkevych, Victoria Vysotska, Yurii Myshkovskyi, Nazar Nakonechnyi, Andrii Nazarkevych:
Model for forecasting the development of information threats in the cyberspace of Ukraine (short paper). CPITS II 2024: 242-250 - Petro Petriv, Ivan Opirskyy, Nataliia Mazur:
Modern technologies of decentralized databases, authentication, and authorization methods. CPITS II 2024: 60-71 - Svitlana Popereshnyak, Yuriy Novikov, Yuliia Zhdanova:
Cryptographic system security approaches by monitoring the random numbers generation (short paper). CPITS II 2024: 301-309
skipping 16 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-30 02:37 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint