default search action
5th IntelITSIS 2024: Khmelnytskyi, Ukraine
- Tetiana Hovorushchenko, Oleg Savenko, Peter T. Popov, Sergii Lysenko:
Proceedings of the 5th International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, Khmelnytskyi, Ukraine, March 28, 2024. CEUR Workshop Proceedings 3675, CEUR-WS.org 2024
Session 1: Intelligent Information Technologies
- Eugene Fedorov, Olga Nechyporenko, Oleg Grygor, Maryna M. Leshchenko:
Creation of Supply Chain Management Methods Based on Multi-Agent Systems and Metaheuristics. 1-13 - Sergii Babichev, Maksym Korobchynskyi, Myhailo Rudenko, Hanna Batenko:
Applying Biclustering Technique and Gene Ontology Analysis for Gene Expression Data Processing. 14-28 - Vira Liubchenko:
Machine Learning Techniques for Predicting Software Code Properties Using Design Metrics. 29-38 - Oleksandr Romanyuk, Yevhen Zavalniuk:
Deep Learning-Based Determination of Optimal Triangles Number of Graphic Object's Polygonal Model. 39-51 - Bohdan Kovalskyi, Myroslava Dubnevych, Tetyana Holubnyk, Lyudmyla Mayik, Zoryana Selmenska:
The information technology for the formation of high-quality visual content of newspaper publications. 52-71 - Tetiana Hovorushchenko, Yurii Voichur, Dmytro Medzatyi, Artem Boyarchuk, Alina Hnatchuk:
Method for Determining the Security Level of Software. 72-85 - Oleksandr Tymchenko, Bohdana Havrysh, Orest Khamula, Bohdan Kovalskyi, Igor Bagniuk:
Informationally-technological provision of environmental nature reserves monitoring. 86-99 - Tetiana Tereshchenko, Olena Khytra, Yelyzaveta Hnatchuk, Alina Hnatchuk, Houda El Bouhissi:
Decision support system for assessing the economic development potential of a territorial community. 100-117 - Vitaliy Pavlyshyn, Eduard Manziuk, Olexander Barmak, Iurii Krak, Robertas Damasevicius:
Modeling Environment Intelligent Transport System for Eco-Friendly Urban Mobility. 118-136 - Olexander Ryzhanskyi, Eduard Manziuk, Olexander Barmak, Iurii Krak, Nebojsa Bacanin:
An Approach to Optimizing CO2 Emissions in Traffic Control via Reinforcement Learning. 137-155 - Liudmyla Gryzun, Olexiy Lytovchenko:
Predicting COVID-19 incidences based on machine learning. 156-170 - Volodymyr Kysil, Peter T. Popov, Olga Drachuk, Valentyna Hnenna, Inna Martyniuk:
Concept of Information Technology for Diagnosis and Prognosis of Glaucoma Based on Machine Learning Methods. 171-181 - Serhiy Balovsyak, Olga Kroitor, Khrystyna Odaiska, Abdel-Badeeh M. Salem, Serhii Stets:
Car Image Recognition using Convolutional Neural Network with EfficientNet Architecture. 182-195 - Olga Pavlova, Ivan Rudyk, Houda El Bouhissi:
Post-processing of video surveillance systems alarm signals using the YOLOv8 neural network. 196-207 - Tetiana Hovorushchenko, Oleg Voichur, Olha Hovorushchenko, Artem Boyarchuk, Iryna Zasornova:
The Concept of Information Technology for Ensuring Accessibility to Art Objects for the Visually Impaired Persons. 208-222
Session 2: Systems of Information Security
- Vasyl Yatskiv, Elena Nyemkova, Serhii Kulyna, Halyna Kulyna, Stepan Ivasiev:
Data Encryption Method Based on the Redundant Residue Number System. 223-235 - Viacheslav Kovtun, Oksana V. Kovtun:
Service-Oriented Model for Handling mMTC Subscribers' Traffic in a 5G Cluster. 236-246 - Liubomyr S. Sikora, Nataliia Lysa, Olga Fedevych, Yurii Lysyi:
Decision-making logic in operational emergency situations for hierarchical systems management. 247-259 - Mykola Stetsyuk, Viktor Cheshun, Yuriy Stetsyuk, leksandr Kozelskiy, Abdel-Badeeh M. Salem:
A model of a DDoS attack scenario on elements of specialized information technology and methods of combating cybercriminals. 260-269 - Dmytro Denysiuk, Tomas Sochor, Mariia Kapustian, Antonina Kashtalian, Oleg Savenko:
Methods for Detecting Software Implants in Corporate Networks. 270-284 - Artem Kachur, Sergii Lysenko, Oleh Bodnaruk, Piotr Gaj:
Methods of improving security and resilience of VR systems' architecture. 285-304 - Volodymyr Sabat, Lyubomyr Sikora, Bohdan Durnyak, Vitalii Matsiuk, Pavlo Hibey:
Methods for assessing the risk of an emergency in the security system for the information complex of printing enterprises. 305-317 - Sergii Lysenko, Oleksandr Bokhonko, Volodymyr Vorobiyov, Piotr Gaj:
Method for identifying cyberattacks based on the use of social engineering over the phone. 318-329 - Volodymyr Sabat, Bohdan Durniak, Myroslava Kulynych, Olena Havrylyshyn, Pavlo Hibey:
Using semantic analysis of document text in building risk models in the threats system. 330-342 - Yevheniy Sierhieiev, Vadym Paiuk, Anatoliy Sachenko, Andrii Nicheporuk, Andrzej Kwiecien:
A graph-based vulnerability detection method. 343-355 - Olena Veprytska, Vyacheslav Kharchenko:
Analysis of AI powered attacks and protection of UAV assets: quality model-based assessing cybersecurity of mobile system for demining. 356-374 - Serhii Danchuk, Olena Geidarova, Andrii Nicheporuk, Andrzej Kwiecien:
Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods. 375-387 - Pavlo Rehida, Oleg Savenko, Anatoliy Sachenko, Andriy Drozd, Petro Vizhevski:
A trust model that ensures the correctness of computing in grid computing system. 388-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.