default search action
18th ITS 2018: Kyiv, Ukraine
- Aleksandr G. Dodonov, Dmitry V. Lande, Wlodzimierz Khadzhynov, Vitaliy V. Tsyganok, Andrei A. Snarskii, Oleg Chertov:
Selected Papers of the XVIII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2018), Kyiv, Ukraine, November 27, 2018. CEUR Workshop Proceedings 2318, CEUR-WS.org 2019 - Aleksandr G. Dodonov, Dmitry V. Lande, Boris Berezin:
Semantic Models at Task Monitoring Public Opinions. 1-12 - Ihor Yakoviv, Vitaliy V. Tsyganok:
A Procedure for Assessing the State of Cybersecurity of Power Grids. 13-24 - Hryhorii Hnatiienko, Vitaliy Snytyuk, Oleh Suprun:
Application of Decision-making Methods for Evaluation of Complex Information System Functioning Quality. 25-34 - Andrey Arsenov, Igor Ruban, Kyrylo Smelyakov, Anastasiya Chupryna:
Evolution of Convolutional Neural Network Architecture in Image Classification Problems. 35-45 - Julia V. Rogushina, Anatoly Jasonovich Gladun, Serhii M. Pryima:
Use of Ontologies for Metadata Records Analysis in Big Data. 46-63 - Genadiy Churyumov, Vitalii Tkachov, Volodymyr Tokariev, Vladyslav Diachenko:
Method for Ensuring Survivability of Flying Ad-hoc Network Based on Structural and Functional Reconfiguration. 64-76 - Sergii V. Kadenko:
A Hybrid Method of Information Aggregation for Community-level Decision-making. 77-94 - Dmitry V. Lande, Oleh O. Dmytrenko, Andrei Snarskii:
Transformations of Texts into the Complex Network with Applying Visibility Graphs Algorithms. 95-106 - Dmytro Kucherov, Andrii Berezkin:
Protection of Information Networks Based on LoRa Technology. 107-117 - Nataliia Kuznietsova:
Analytical Technologies for Clients' Preferences Analyzing with Incomplete Data Recovering. 118-128 - Hryhorii Hnatiienko, Oleh Suprun:
Fuzzy Set Objects Clustering Method Using Evolution Technologies. 129-138 - Aleksandr Koval, Safwan Al Salaimeh, Oleh V. Andriichuk:
Usage of Expert Classification in Diagnostic Expert Systems' Knowledge Bases Construction. 139-149 - Aleksandr Matov:
Mathematical Models of Cloud Computing with Absolute-relative Priorities of Providing of Computer Resources to Users in Conditions of Functioning Features and Failures. 150-159 - Stanislav Bielievtsov, Igor Ruban, Kyrylo Smelyakov, Dmytro Sumtsov:
Network Technology for Transmission of Visual Information. 160-175 - Bogdan Korniyenko, Liliya Galata, Lesya Ladieva:
Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources. 176-187 - Serhii Otrokh, Valeriy Kuzminykh, Olena Hryshchenko:
Method of Forming the Ring Codes. 188-198 - Nataliia Tmienova, Bogdan Sus:
Hardware Data Encryption Complex Based on Programmable Microcontrollers. 199-208 - Mykyta Savchenko, Vitaliy V. Tsyganok, Oleh V. Andriichuk:
Decision Support Systems' Security Model Based on Decentralized Data Platforms. 209-221 - Dmitry Lande, Zijiang Yang, Shiwei Zhu, Jianping Guo, Moji Wei:
Automatic Text Summarization of Chinese Legal Information. 222-238 - Igor Subach, Alexander Chauzov:
Метод розподілу таблиць реляційної бази даних рівного об'єму та різними ймовірностями звертання до них в інформаційно-обчислювальній мережі АСУ (The Method of Distribution of Tables of a Relational Database of Equal Volume and Different Probabilities of Solving them in the Information and Computing Network of Automated Control Systems). 239-250 - Vitalii Zubok:
Метричний підхід до оцінки ризику кібератак на глобальну маршрутизацію (Metric Approach to Risk Evaluation of Cyberattacks on Global Routing). 251-260 - Aleksandr Dodonov, Olena Gorbachyk, Maryna Kuznietsova:
Підвищення живучості автоматизованих систем організаційного управління як шлях до безпеки критичних інфраструктур (Increasing the Survivability of Automated Systems of Organizational Management as a Way to Security of Critical Infrastructures). 261-270 - Iryna V. Balagura, Valentyna B. Andrushchenko, Ivan V. Gorbov:
Detection of Expert Groups for Scientific Expertise. 271-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.