


default search action
CPITS 2024: Kyiv, Ukraine
- Volodymyr Sokolov, Vasyl Ustimenko, Tamara Radivilova, Mariya Nazarkevych:

Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), Kyiv, Ukraine, February 28, 2024 (online). CEUR Workshop Proceedings 3654, CEUR-WS.org 2024 - Vasyl Ustimenko, Oleksandr Pustovit:

Implementation of New Families of Graph-based Stream Ciphers with the Hidden Multivariate Nature. 1-14 - Juliy Boiko, Volodymyr Druzhynin, Serhii Buchyk, Ilya Pyatin, Andrii Kulko:

Methodology of FPGA Implementation and Performance Evaluation of Polar Coding for 5G Communications. 15-24 - Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Nataliia Korshun:

Automated Conformity Verification Concept for Cloud Security. 25-37 - Valeriia Balatska, Vasyl Poberezhnyk, Petro Petriv, Ivan R. Opirskyy:

Blockchain Application Concept in SSO Technology Context. 38-49 - Mariia Nazarkevych, Maryna Kostiak, Nazar Oleksiv, Victoria Vysotska, Andrii-Taras Shvahuliak:

A YOLO-based Method for Object Contour Detection and Recognition in Video Sequences. 49-58 - Oleksandr Vakhula, Yevhenii Kurii, Ivan R. Opirskyy, Vitalii Susukailo:

Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 Requirements. 59-72 - Olha Tkachenko, Kostiantyn Tkachenko, Oleksandr Tkachenko, Roman Kyrychok, Vladyslav Yaskevych:

Neural Networks in the Processing of Natural Language Texts in Information Learning Systems. 73-87 - Kostiantyn Tkachenko, Olha Tkachenko, Oleksandr Tkachenko, Nataliia Mazur, Iryna V. Mashkina:

Ontological Approach in Modern Educational Processes. 88-97 - Olha Mykhaylova, Artem Stefankiv, Taras Nakonechny, Taras Fedynyshyn, Volodymyr Sokolov:

Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel. 98-110 - Emil Faure, Anatoly Shcherba, Artem Lavdanskyi, Mykola Makhynko, Muhabbat Khizirova:

Three-Pass Protocol on Permutations: Implementation Example and Security. 110-124 - Bohdan Zhurakovskyi, Vadym Poltorak, Serhii Toliupa, Oleksandr Pliushch, Artem Platonenko:

Processing and Analyzing Images based on a Neural Network. 125-136 - Vira Babenko, Tetiana Myroniuk, Artem Lavdanskyi, Yaroslav Tarasenko, Oleg Myroniuk:

Information-Driven Permutation Operations for Cryptographic Transformation. 137-149 - Oleksandr Lavrynenko, Bohdan Chumachenko, Maksym Zaliskyi, Serhii Chumachenko, Denys Bakhtiiarov:

Method of Remote Biometric Identification of a Person by Voice based on Wavelet Packet Transform. 150-162 - Svitlana Popereshnyak, Anastasiya Vecherkovskaya, Viktoriia V. Zhebka:

Intrusion Detection based on an Intelligent Security System using Machine Learning Methods. 163-178 - Ivan Liminovych, Vadym Poltorak, Nadia Kushnir, Bohdan Zhurakovskyi, Sergiy Obushnyi:

Protection System for Analysis of External Link Placing. 179-188 - Oleksandr Nonik, Nadiia Lobanchykova, Tetiana A. Vakaliuk, Viacheslav Osadchyi, Oleksandr Farrakhov:

Approaches to Solving Proxy Performance Problems for HTTP and SOCKS5 Protocols for the Case of Multi-Port Passwordless Access. 189-200 - Volodymyr Khoma, Aziz Abibulaiev, Andrian Piskozub, Taras Kret:

Comprehensive Approach for Developing an Enterprise Cloud Infrastructure. 201-215 - Andrii Roskladka, Nataliia Roskladka, Volodymyr Kulazhenko, Alona Desiatko, Alona Shtanova:

Association Rule System for Effective Risk Management of a Cinema Chain. 216-227 - Illia Zaiets, Vitalii Brydinskyi, Dmytro Sabodashko, Yuriy Khoma, Khrystyna Ruda:

Integrated System for Speaker Diarization and Intruder Detection using Speaker Embeddings. 228-238 - Olha Mykhaylova, Taras Fedynyshyn, Volodymyr Sokolov, Roman Kyrychok:

Person-of-Interest Detection on Mobile Forensics Data - AI-Driven Roadmap. 239-251 - Iryna Zamrii, Viktor Vyshnivskyi, Valentyn Sobchuk:

Method of Ensuring the Functional Stability of the Information System based on Detection of Intrusions and Reconfiguration of Virtual Networks. 252-264 - Mariia Nazarkevych, Vasyl Lytvyn, Maryna Kostiak, Nazar Oleksiv, Nazar Nconechnyi:

Method of Dataset Filling and Recognition of Moving Objects in Video Sequences based on YOLO. 265-276 - Yurii Dreis, Oleksandr Korchenko, Zoreslava Brzhevska, Larysa Kriuchkova, Olena Nesterova:

Model to Formation Data Base of Internal Parameters for Assessing the Status of the State Secret Protection. 277-289 - Volodymyr Astapenya, Yuliia Zhdanova, Svitlana Shevchenko, Svitlana Spasiteleva, Olena Kryvoruchko:

Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare. 290-300 - Hryhorii Hnatiienko, Vladyslav Hnatiienko, Ravshanbek Zulunov, Tetiana Babenko, Larysa Myrutenko:

Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements. 301-311 - Denys Bakhtiiarov, Bohdan Chumachenko, Oleksandr Lavrynenko, Serhii Chumachenko, Vitalii Kurushkin:

Method of Binary Detection of Small Unmanned Aerial Vehicles. 312-321 - Viktoriia V. Zhebka, Pavlo Skladannyi, Serhii Zhebka, Svitlana Shlianchak, Andrii Bondarchuk:

Methodology for Predicting Failures in a Smart Home based on Machine Learning Methods. 322-332 - Svitlana Shevchenko, Yuliia Zhdanova, Volodymyr Astapenya, Olena Nehodenko, Svitlana Spasiteleva:

Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels. 333-342 - Viktoriya Sydorenko, Oksana Zhyharevych, Rat Berdybaev, Artem Polozhentsev, Andriy Fesenko:

Ontological-Relational Data Store Model for a Cloud-based SIEM System Development. 343-354 - Valerii Lakhno, Yurij Tikhonov, Nazym Sabitova, Lidiya Taimuratova, Mereke Zhumadulova:

Optimization of the Structure of an Information Security Textbook using Genetic Algorithm (short paper). 355-360 - Andii Sahun, Vladyslav Khaidurov, Viktor Bobkov:

Model of Graphic Object Identification in a Video Surveillance System based on a Neural Network (short paper). 361-367 - Vladyslav V. Bilous, Dmytro Bodnenko, Oleksii Khokhlov, Oleksandra V. Lokaziuk, Iryna Stadnik:

Open Source Intelligence for War Crime Documentation (short paper). 368-375 - Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Viktoriia Bolotina:

Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy (short paper). 376-383 - Svitlana Rzaieva, Dmytro Rzaiev, Yuliya Kostyuk, Hennadii Hulak, Oleksandr Shcheblanin:

Methods of Modeling Database System Security (short paper). 384-390 - Valeriy Dudykevych, Serhii Yevseiev, Halyna Mykytyn, Khrystyna Ruda, Hennadii Hulak:

Detecting Deepfake Modifications of Biometric Images using Neural Networks (short paper). 391-397 - Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Anatoliy Obshta, Nataliia Korshun:

Designing Data Classification and Secure Store Policy According to SOC 2 Type II (short paper). 398-409 - Volodymyr Shapoval, Liudmyla Zubyk, Yaroslav Zubyk, Oleg Kurchenko, Valerii Kozachok:

Automation of Data Management Processes in Cloud Storage (short paper). 410-418 - Larysa Kriuchkova, Ivan Tsmokanych, Maksym Vovk, Nataliia Mazur, Oleksandr Bohdanov:

Influence of Protective Signals on Dangerous Signals of High-Frequency Imposition (short paper). 419-425 - Valerii Lakhno, Nurzhamal Oshanova, Jamilya Akhmetova, Nurgazy Kurbaniyazov, Miroslav Lakhno:

Analyzing Students' Online Activity to Enhance Education Quality and Boost University Digital Security (short paper). 426-431 - Anton Zahynei, Yurii Shcheblanin, Oleg Kurchenko, Andrii Anosov, Vladyslav Kruglyk:

Method for Calculating the Residual Resource of Fog Node Elements of Distributed Information Systems of Critical Infrastructure Facilities (short paper). 432-439 - Svitlana Popereshnyak, Anastasiya Vecherkovskaya, Liubov Ivanova:

Neural Networks to Recognize Ships on Satellite Images (short paper). 440-448 - Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk, Pavlo Skladannyi:

Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society (short paper). 449-457 - Luka Kadyntsev, Liudmyla Zubyk, Serhii Kulibaba, Anastasiia Ivanytska, Alona Chorna:

Business Activity Indicators for Detecting the Impact of Income Information (short paper). 458-464 - Nadiia Dovzhenko, Oleg Barabash, Andrii Musienko, Yevhen Ivanichenko, Iryna Krasheninnik:

Enhancing Sensor Network Efficiency Through Optimized Flooding Mechanism (short paper). 465-470 - Yevhenii Voievodin, Inna Rozlomii:

Application Security Optimization in Container Orchestration Systems Through Strategic Scheduler Decisions (short paper). 471-478 - Nadiia Kazakova, Artem Sokolov, Nataliia Balandina:

Dependence of the Algebraic Nonlinearity of 4-Functions of Two Variables from the Cryptographic Properties of Their Component Boolean Functions (short paper). 479-484 - Yurii Hryshchenko, Victor Romanenko, Oleksii Chuzha, Vladyslav Hryshchenko:

Telecommunication Warning of the Crew about the Failure of On-Board Radio Altimeters (short paper). 485-490 - Ihor Koriakov, Oleksandr Pliushch, Serhii Toliupa:

Performing Data Ciphering with the Help of Digital Filters (short paper). 491-496 - Vladimer Svanadze, Maksim Iavich, Sergiy Gnatyuk:

Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper). 497-504 - Igor Sinitsyn, Yevhen Derevianko, Stanislav Denysyuk, Volodymyr Shevchenko:

Optimizing Reference Routes through Waypoint Sequence Variation in Emergency Events of Natural and Technological Origin (short paper). 505-512 - Sakhybay Tynymbayev, Sergiy Gnatyuk, Margulan Ibraimov, Timur Namazbayev, Assel Mukasheva:

Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper). 513-519 - Vladimer Svanadze, Maksim Iavich:

Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet (short paper). 520-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














