default search action
CPITS 2024: Kyiv, Ukraine
- Volodymyr Sokolov, Vasyl Ustimenko, Tamara Radivilova, Mariya Nazarkevych:
Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), Kyiv, Ukraine, February 28, 2024 (online). CEUR Workshop Proceedings 3654, CEUR-WS.org 2024 - Vasyl Ustimenko, Oleksandr Pustovit:
Implementation of New Families of Graph-based Stream Ciphers with the Hidden Multivariate Nature. 1-14 - Juliy Boiko, Volodymyr Druzhynin, Serhii Buchyk, Ilya Pyatin, Andrii Kulko:
Methodology of FPGA Implementation and Performance Evaluation of Polar Coding for 5G Communications. 15-24 - Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Nataliia Korshun:
Automated Conformity Verification Concept for Cloud Security. 25-37 - Valeriia Balatska, Vasyl Poberezhnyk, Petro Petriv, Ivan Opirskyy:
Blockchain Application Concept in SSO Technology Context. 38-49 - Mariia Nazarkevych, Maryna Kostiak, Nazar Oleksiv, Victoria Vysotska, Andrii-Taras Shvahuliak:
A YOLO-based Method for Object Contour Detection and Recognition in Video Sequences. 49-58 - Oleksandr Vakhula, Yevhenii Kurii, Ivan Opirskyy, Vitalii Susukailo:
Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 Requirements. 59-72 - Olha Tkachenko, Kostiantyn Tkachenko, Oleksandr Tkachenko, Roman Kyrychok, Vladyslav Yaskevych:
Neural Networks in the Processing of Natural Language Texts in Information Learning Systems. 73-87 - Kostiantyn Tkachenko, Olha Tkachenko, Oleksandr Tkachenko, Nataliia Mazur, Iryna V. Mashkina:
Ontological Approach in Modern Educational Processes. 88-97 - Olha Mykhaylova, Artem Stefankiv, Taras Nakonechny, Taras Fedynyshyn, Volodymyr Sokolov:
Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel. 98-110 - Emil Faure, Anatoly Shcherba, Artem Lavdanskyi, Mykola Makhynko, Muhabbat Khizirova:
Three-Pass Protocol on Permutations: Implementation Example and Security. 110-124 - Bohdan Zhurakovskyi, Vadym Poltorak, Serhii Toliupa, Oleksandr Pliushch, Artem Platonenko:
Processing and Analyzing Images based on a Neural Network. 125-136 - Vira Babenko, Tetiana Myroniuk, Artem Lavdanskyi, Yaroslav Tarasenko, Oleg Myroniuk:
Information-Driven Permutation Operations for Cryptographic Transformation. 137-149 - Oleksandr Lavrynenko, Bohdan Chumachenko, Maksym Zaliskyi, Serhii Chumachenko, Denys Bakhtiiarov:
Method of Remote Biometric Identification of a Person by Voice based on Wavelet Packet Transform. 150-162 - Svitlana Popereshnyak, Anastasiya Vecherkovskaya, Viktoriia Zhebka:
Intrusion Detection based on an Intelligent Security System using Machine Learning Methods. 163-178 - Ivan Liminovych, Vadym Poltorak, Nadia Kushnir, Bohdan Zhurakovskyi, Sergiy Obushnyi:
Protection System for Analysis of External Link Placing. 179-188 - Oleksandr Nonik, Nadiia Lobanchykova, Tetiana A. Vakaliuk, Viacheslav Osadchyi, Oleksandr Farrakhov:
Approaches to Solving Proxy Performance Problems for HTTP and SOCKS5 Protocols for the Case of Multi-Port Passwordless Access. 189-200 - Volodymyr Khoma, Aziz Abibulaiev, Andrian Piskozub, Taras Kret:
Comprehensive Approach for Developing an Enterprise Cloud Infrastructure. 201-215 - Andrii Roskladka, Nataliia Roskladka, Volodymyr Kulazhenko, Alona Desiatko, Alona Shtanova:
Association Rule System for Effective Risk Management of a Cinema Chain. 216-227 - Illia Zaiets, Vitalii Brydinskyi, Dmytro Sabodashko, Yuriy Khoma, Khrystyna Ruda:
Integrated System for Speaker Diarization and Intruder Detection using Speaker Embeddings. 228-238 - Olha Mykhaylova, Taras Fedynyshyn, Volodymyr Sokolov, Roman Kyrychok:
Person-of-Interest Detection on Mobile Forensics Data - AI-Driven Roadmap. 239-251 - Iryna Zamrii, Viktor Vyshnivskyi, Valentyn Sobchuk:
Method of Ensuring the Functional Stability of the Information System based on Detection of Intrusions and Reconfiguration of Virtual Networks. 252-264 - Mariia Nazarkevych, Vasyl Lytvyn, Maryna Kostiak, Nazar Oleksiv, Nazar Nconechnyi:
Method of Dataset Filling and Recognition of Moving Objects in Video Sequences based on YOLO. 265-276 - Yurii Dreis, Oleksandr Korchenko, Zoreslava Brzhevska, Larysa Kriuchkova, Olena Nesterova:
Model to Formation Data Base of Internal Parameters for Assessing the Status of the State Secret Protection. 277-289 - Volodymyr Astapenya, Yuliia Zhdanova, Svitlana Shevchenko, Svitlana Spasiteleva, Olena Kryvoruchko:
Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare. 290-300 - Hryhorii Hnatiienko, Vladyslav Hnatiienko, Ravshanbek Zulunov, Tetiana Babenko, Larysa Myrutenko:
Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements. 301-311 - Denys Bakhtiiarov, Bohdan Chumachenko, Oleksandr Lavrynenko, Serhii Chumachenko, Vitalii Kurushkin:
Method of Binary Detection of Small Unmanned Aerial Vehicles. 312-321 - Viktoriia Zhebka, Pavlo Skladannyi, Serhii Zhebka, Svitlana Shlianchak, Andrii Bondarchuk:
Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods. 322-332 - Svitlana Shevchenko, Yuliia Zhdanova, Volodymyr Astapenya, Olena Nehodenko, Svitlana Spasiteleva:
Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels. 333-342 - Viktoriya Sydorenko, Oksana Zhyharevych, Rat Berdybaev, Artem Polozhentsev, Andriy Fesenko:
Ontological-Relational Data Store Model for a Cloud-based SIEM System Development. 343-354 - Valerii Lakhno, Yurij Tikhonov, Nazym Sabitova, Lidiya Taimuratova, Mereke Zhumadulova:
Optimization of the Structure of an Information Security Textbook using Genetic Algorithm (short paper). 355-360 - Andii Sahun, Vladyslav Khaidurov, Viktor Bobkov:
Model of Graphic Object Identification in a Video Surveillance System based on a Neural Network (short paper). 361-367 - Vladyslav V. Bilous, Dmytro Bodnenko, Oleksii Khokhlov, Oleksandra V. Lokaziuk, Iryna Stadnik:
Open Source Intelligence for War Crime Documentation (short paper). 368-375 - Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Viktoriia Bolotina:
Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy (short paper). 376-383 - Svitlana Rzaieva, Dmytro Rzaiev, Yuliya Kostyuk, Hennadii Hulak, Oleksandr Shcheblanin:
Methods of Modeling Database System Security (short paper). 384-390 - Valeriy Dudykevych, Serhii Yevseiev, Halyna Mykytyn, Khrystyna Ruda, Hennadii Hulak:
Detecting Deepfake Modifications of Biometric Images using Neural Networks (short paper). 391-397 - Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Anatoliy Obshta, Nataliia Korshun:
Designing Data Classification and Secure Store Policy According to SOC 2 Type II (short paper). 398-409 - Volodymyr Shapoval, Liudmyla Zubyk, Yaroslav Zubyk, Oleg Kurchenko, Valerii Kozachok:
Automation of Data Management Processes in Cloud Storage (short paper). 410-418 - Larysa Kriuchkova, Ivan Tsmokanych, Maksym Vovk, Nataliia Mazur, Oleksandr Bohdanov:
Influence of Protective Signals on Dangerous Signals of High-Frequency Imposition (short paper). 419-425 - Valerii Lakhno, Nurzhamal Oshanova, Jamilya Akhmetova, Nurgazy Kurbaniyazov, Miroslav Lakhno:
Analyzing Students' Online Activity to Enhance Education Quality and Boost University Digital Security (short paper). 426-431 - Anton Zahynei, Yurii Shcheblanin, Oleg Kurchenko, Andrii Anosov, Vladyslav Kruglyk:
Method for Calculating the Residual Resource of Fog Node Elements of Distributed Information Systems of Critical Infrastructure Facilities (short paper). 432-439 - Svitlana Popereshnyak, Anastasiya Vecherkovskaya, Liubov Ivanova:
Neural Networks to Recognize Ships on Satellite Images (short paper). 440-448 - Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk, Pavlo Skladannyi:
Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society (short paper). 449-457 - Luka Kadyntsev, Liudmyla Zubyk, Serhii Kulibaba, Anastasiia Ivanytska, Alona Chorna:
Business Activity Indicators for Detecting the Impact of Income Information (short paper). 458-464 - Nadiia Dovzhenko, Oleg Barabash, Andrii Musienko, Yevhen Ivanichenko, Iryna Krasheninnik:
Enhancing Sensor Network Efficiency Through Optimized Flooding Mechanism (short paper). 465-470 - Yevhenii Voievodin, Inna Rozlomii:
Application Security Optimization in Container Orchestration Systems Through Strategic Scheduler Decisions (short paper). 471-478 - Nadiia Kazakova, Artem Sokolov, Nataliia Balandina:
Dependence of the Algebraic Nonlinearity of 4-Functions of Two Variables from the Cryptographic Properties of Their Component Boolean Functions (short paper). 479-484 - Yurii Hryshchenko, Victor Romanenko, Oleksii Chuzha, Vladyslav Hryshchenko:
Telecommunication Warning of the Crew about the Failure of On-Board Radio Altimeters (short paper). 485-490 - Ihor Koriakov, Oleksandr Pliushch, Serhii Toliupa:
Performing Data Ciphering with the Help of Digital Filters (short paper). 491-496 - Vladimer Svanadze, Maksim Iavich, Sergiy Gnatyuk:
Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper). 497-504 - Igor Sinitsyn, Yevhen Derevianko, Stanislav Denysyuk, Volodymyr Shevchenko:
Optimizing Reference Routes through Waypoint Sequence Variation in Emergency Events of Natural and Technological Origin (short paper). 505-512 - Sakhybay Tynymbayev, Sergiy Gnatyuk, Margulan Ibraimov, Timur Namazbayev, Assel Mukasheva:
Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper). 513-519 - Vladimer Svanadze, Maksim Iavich:
Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet (short paper). 520-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.