


default search action
5th IntelITSIS 2024: Khmelnytskyi, Ukraine
- Tetiana Hovorushchenko, Oleg Savenko, Peter T. Popov, Sergii Lysenko:

Proceedings of the 5th International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, Khmelnytskyi, Ukraine, March 28, 2024. CEUR Workshop Proceedings 3675, CEUR-WS.org 2024
Session 1: Intelligent Information Technologies
- Eugene Fedorov, Olga Nechyporenko, Oleg Grygor, Maryna M. Leshchenko:

Creation of Supply Chain Management Methods Based on Multi-Agent Systems and Metaheuristics. 1-13 - Sergii Babichev, Maksym Korobchynskyi, Myhailo Rudenko, Hanna Batenko:

Applying Biclustering Technique and Gene Ontology Analysis for Gene Expression Data Processing. 14-28 - Vira Liubchenko:

Machine Learning Techniques for Predicting Software Code Properties Using Design Metrics. 29-38 - Oleksandr Romanyuk, Yevhen Zavalniuk:

Deep Learning-Based Determination of Optimal Triangles Number of Graphic Object's Polygonal Model. 39-51 - Bohdan Kovalskyi, Myroslava Dubnevych, Tetyana Holubnyk, Lyudmyla Mayik, Zoryana Selmenska:

The information technology for the formation of high-quality visual content of newspaper publications. 52-71 - Tetiana Hovorushchenko, Yurii Voichur, Dmytro Medzatyi, Artem Boyarchuk, Alina Hnatchuk:

Method for Determining the Security Level of Software. 72-85 - Oleksandr Tymchenko, Bohdana Havrysh, Orest Khamula, Bohdan Kovalskyi, Igor Bagniuk:

Informationally-technological provision of environmental nature reserves monitoring. 86-99 - Tetiana Tereshchenko, Olena Khytra, Yelyzaveta Hnatchuk, Alina Hnatchuk, Houda El Bouhissi:

Decision support system for assessing the economic development potential of a territorial community. 100-117 - Vitaliy Pavlyshyn, Eduard Manziuk, Olexander Barmak, Iurii Krak, Robertas Damasevicius:

Modeling Environment Intelligent Transport System for Eco-Friendly Urban Mobility. 118-136 - Olexander Ryzhanskyi, Eduard Manziuk, Olexander Barmak, Iurii Krak, Nebojsa Bacanin:

An Approach to Optimizing CO2 Emissions in Traffic Control via Reinforcement Learning. 137-155 - Liudmyla Gryzun, Olexiy Lytovchenko:

Predicting COVID-19 incidences based on machine learning. 156-170 - Volodymyr Kysil, Peter T. Popov, Olga Drachuk, Valentyna Hnenna, Inna Martyniuk:

Concept of Information Technology for Diagnosis and Prognosis of Glaucoma Based on Machine Learning Methods. 171-181 - Serhiy Balovsyak, Olga Kroitor, Khrystyna Odaiska, Abdel-Badeeh M. Salem, Serhii Stets:

Car Image Recognition using Convolutional Neural Network with EfficientNet Architecture. 182-195 - Olga Pavlova, Ivan Rudyk, Houda El Bouhissi:

Post-processing of video surveillance systems alarm signals using the YOLOv8 neural network. 196-207 - Tetiana Hovorushchenko, Oleg Voichur, Olha Hovorushchenko, Artem Boyarchuk, Iryna Zasornova:

The Concept of Information Technology for Ensuring Accessibility to Art Objects for the Visually Impaired Persons. 208-222
Session 2: Systems of Information Security
- Vasyl Yatskiv, Elena Nyemkova, Serhii Kulyna, Halyna Kulyna, Stepan Ivasiev:

Data Encryption Method Based on the Redundant Residue Number System. 223-235 - Viacheslav Kovtun, Oksana V. Kovtun:

Service-Oriented Model for Handling mMTC Subscribers' Traffic in a 5G Cluster. 236-246 - Liubomyr S. Sikora, Nataliia Lysa, Olga Fedevych, Yurii Lysyi:

Decision-making logic in operational emergency situations for hierarchical systems management. 247-259 - Mykola Stetsyuk, Viktor Cheshun, Yuriy Stetsyuk, Oleksandr Kozelskiy, Abdel-Badeeh M. Salem:

A model of a DDoS attack scenario on elements of specialized information technology and methods of combating cybercriminals. 260-269 - Dmytro Denysiuk, Tomas Sochor, Mariia Kapustian, Antonina Kashtalian, Oleg Savenko:

Methods for Detecting Software Implants in Corporate Networks. 270-284 - Artem Kachur, Sergii Lysenko, Oleh Bodnaruk, Piotr Gaj:

Methods of improving security and resilience of VR systems' architecture. 285-304 - Volodymyr Sabat, Lyubomyr Sikora, Bohdan Durnyak, Vitalii Matsiuk, Pavlo Hibey:

Methods for assessing the risk of an emergency in the security system for the information complex of printing enterprises. 305-317 - Sergii Lysenko, Oleksandr Bokhonko, Volodymyr Vorobiyov, Piotr Gaj:

Method for identifying cyberattacks based on the use of social engineering over the phone. 318-329 - Volodymyr Sabat, Bohdan Durniak, Myroslava Kulynych, Olena Havrylyshyn, Pavlo Hibey:

Using semantic analysis of document text in building risk models in the threats system. 330-342 - Yevheniy Sierhieiev, Vadym Paiuk, Anatoliy Sachenko, Andrii Nicheporuk, Andrzej Kwiecien:

A graph-based vulnerability detection method. 343-355 - Olena Veprytska, Vyacheslav Kharchenko:

Analysis of AI powered attacks and protection of UAV assets: quality model-based assessing cybersecurity of mobile system for demining. 356-374 - Serhii Danchuk, Olena Geidarova, Andrii Nicheporuk, Andrzej Kwiecien:

Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods. 375-387 - Pavlo Rehida, Oleg Savenko, Anatoliy Sachenko, Andriy Drozd, Petro Vizhevski:

A trust model that ensures the correctness of computing in grid computing system. 388-401

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














