default search action
CPITS II 2021: Kyiv, Ukraine
- Anatoly Bessalov, Dmytro Ageyev, Valeriy Lahno, Volodymyr Sokolov:
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), Kyiv, Ukraine, October 26, 2021 (online). CEUR Workshop Proceedings 3187, CEUR-WS.org 2022 - Tetiana Neskorodieva, Eugene Fedorov, Oleksii Smirnov, Kostiantyn Rudakov, Anastasiia Neskorodieva:
Method Detection Audit Data Anomalies on Basis Restricted Cauchy Machine. 1-12 - Adilia Batorshyna, Volodymyr Tokar, Natalia Kotenko, Serhii Chekhovych, Andrii Homotiuk:
The Impact of Awareness Stimulating Activities and Events on Global Islamic Finance Assets: Enhancing Financial Risk Management and Economic Security in Non-Muslim Countries. 13-26 - Anatolii Morozov, Alla Hrebennyk, Elen Trunova, Igor Skiter, Evgen Hulak:
Design of Industry Centers of Cyber Security of Facilities of Critical Infrastructure. 27-37 - Volodymyr Tokar, Ellana Molchanova, Yuliia Honcharova, Tetiana Zhyrova, Kateryna Ilikchiieva:
Fostering Gender Equality to Stimulate Economic Growth: Legal and Institutional Measures to Enhance Economic Security of EU Member-states and Ukraine. 38-47 - Dmytro Proskurin, Sergiy Gnatyuk, Madina Bauyrzhan:
Distributive Training can Improve Neural Network Performance based on RL-CNN Architecture. 48-57 - Nadia Pasieka, Vasyl Sheketa, Myroslava Kulynych, Yulia Romanyshyn, Svitlana Chupakhina, Olha Khytrova:
Machine Training for Intelligent Analysis of Text for the Identification of the Author. 58-68 - Nataliia Morze, Mariia Boiko, Liliia Varchenko-Trotsenko, Viktoriia Vember:
Formation of Internet Resources Critical Evaluation Skills of Future Primary School Teachers. 69-78 - Ihor Subach, Dmytro Mogylevych, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev:
Design Methodology of Cybersecurity Situational Center. 79-88 - Ivan Chychkan, Svitlana Spasiteleva, Svitlana Shevchenko, Yuliia Zhdanova, Halyna Shevchenko:
Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation. 89-102 - Mariia Astafieva, Dmytro Bodnenko, Oksana Lytvyn, Volodymyr Proshkin, Oleksii B. Zhyltsov:
Mathematical Modeling as a Tool for Interdisciplinary Training of Computer Sciences and Cybersecurity Students. 103-116 - Mykola Khudyntsev, Andrii Davydiuk, Oleksiy Lebid, Oleksandr Trofymchuk, Artem Zhylin:
Cybersecurity Indices: Review and Classification. 117-126 - Sergiy Gnatyuk, Rat Berdibayev, Ivan Azarov, Nazerke Baisholan, Iryna Lozova:
Modern Types of Databases for SIEM System Development. 127-138 - Maksim Iavich, Giorgi Iashvili, Zhadyra Avkurova, Serhii Dorozhynskyi, Andriy Fesenko:
Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment. 139-149 - Vasyl Trysnyuk, Kirill Smetanin, Ihor Humeniuk, Oleksii Samchyshyn, Taras Trysnyuk:
Information Encryption Method based on a Combination of Steganographic and Cryptographic Algorithm's Features. 150-159 - Maksim Iavich, Dinara Ospanova, Ketevan Grdzelidze, Rashit Brzhanov, Yuliia Polishchuk:
Advanced Data Security and Privacy Ensuring Methods in 5G Era. 160-169 - Tatiana Prokopenko, Yaroslav Tarasenko, Olha Lavdanska, Serhii Rudnytskyi, Yuliia Rudnytska:
Developing the Comprehensive Technology for Alternative Management of Complex Organizational and Technological Objects in the Conditions of Cyber Threats. 170-181 - Volodymyr Rudnytskyi, Vira Babenko, Nataliia Lada, Yaroslav Tarasenko, Yuliia Rudnytska:
Constructing Symmetric Operations of Cryptographic Information Encoding. 182-194 - Vitalii Savchenko, Oleksander Matsko, Ivan Havryliuk, Kseniia Yerhidzei, Iryna Novikova:
Two-Parametric Model for Detecting Slow HTTP DDoS Attacks based on Predicting User Behavior. 195-205 - Nurgul A. Seilova, Almas Kungozhin, Renat Ibrayev, Lev Gorlov, Zhandar Ospanov, Ruslan Itemirov, Igor Kiyashko:
About Cryptographic Properties of the Qalqan Encryption Algorithm. 206-215 - Ievgen Iosifov, Olena Iosifova, Volodymyr Sokolov, Pavlo Skladannyi, Igor Sukaylo:
Natural Language Technology to Ensure the Safety of Speech Information. 216-226 - Volodymyr Saiko, Serhii Toliupa, Volodymyr Nakonechnyi, Mykola Brailovskyi, Teodor Narytnik:
Method of Increasing the Efficiency of Managing Energy Potential Protected Radioliniy Terahertz Range using Artificial Intelligence (short paper). 227-235 - Valeriy Lakhno, Andrii Blozva, Dmytro Kasatkin, Dmitro Tyshchenko, Tamara Franchuk:
Modified Genetic Algorithm for Solving the Problem of Selecting Hardware and Software for Information Security (short paper). 236-243 - Igor Skiter, Hennadii Hulak, Viktor Grechaninov, Vitalii Klymenko, Nikolay Ievlev:
System Approach to the Creation of Cybersecurity Centers of Critical Infrastructure (short paper). 244-250 - Yevhen Ivanichenko, Valerii Kozachok, Yurii Dreis, Olena Nesterova, Kate Dmytriienko:
Exposing Deviations in Information Processes using Multifractal Analysis (short paper). 251-259 - Valeriia V. Loiko, Olena S. Aleksandrova, Vitalii N. Zavadskyi, Tatiana Bezprozvanna, Kateryna Pozdieieva:
Risk Analysis and Determination of the Security Level of the Information Ecosystem of the Educational Institution with the Help of an Expert System (short paper). 260-267 - Andrii Sahun, Vladyslav Khaidurov, Pavlo Gikalo:
Improving the RC5RA Algorithm's Crypto Resistance for Embedded Computers (short paper). 268-275 - Olena Nehodenko, Svitlana Shevchenko, Nataliia Trintina, Volodymyr Astapenya, Oleksandr Tereshchenko:
Problematic Issues of Approximation and Interpolation in Signal Processing in Secure Information Systems (short paper). 276-283 - Sergiy Obushnyi, Denis Virovets, Hennadii Hulak, Artem Platonenko, Roman Kyrychok:
Ensuring Data Security in the Peer-to-Peer Economic System of the DAO (short paper). 284-292 - Stanislav Dovgiy, Oleh Kopiika, Oleksii Kozlov:
Architectures for the Information Systems, Network Resources, and Network Services (short paper). 293-301 - Anatoly Bessalov, Volodymyr Sokolov, Pavlo Skladannyi, Nataliia Mazur, Dmytro Ageyev:
Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves. 302-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.