Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/its2:"
@proceedings{DBLP:conf/its2/2022, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3503}, urn = {urn:nbn:de:0074-3503-3}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AndriichukK22, author = {Oleh V. Andriichuk and Sergii V. Kadenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Ranking-dependent Decision Support Methods for Weakly-structured Domains}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {32--41}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper4.pdf}, timestamp = {Fri, 08 Dec 2023 14:24:28 +0100}, biburl = {https://dblp.org/rec/conf/its2/AndriichukK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BaranovskaM22, author = {Lesia Baranovska and Vadym Mukhin}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Group Pursuit Problem for Fraction Differential Systems with Pure Delay}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {82--91}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper8.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BaranovskaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovGK22, author = {Oleksandr Dodonov and Olena Gorbachyk and Maryna Kuznietsova}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Analysis and Assessment of Functional Stability of Information Systems Supporting Management Processes}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {1--10}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper1.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoB22, author = {Hryhorii Hnatiienko and Tetiana Babenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Quantitative Assessment of the Criticality Level of Organizational System Elements}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {62--81}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper7.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoIMVG22, author = {Hryhorii Hnatiienko and Oleh Ilarionov and Larysa Myrutenko and Oksana Vlasenko and Snizhana Gamotska}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {An Intelligent Cloud-based System for Conduction of an Enrollment Campaign}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {161--176}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper15.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoIMVG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HorniichukTEM22, author = {Ivan Horniichuk and Vitaliy V. Tsyganok and Viktor Evetskyi and Artem Mykytiuk}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Model of Handwritten Signature Based User Authentication}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {141--150}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper13.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HorniichukTEM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KovalKHXZ22, author = {Oleksandr V. Koval and Valeriy O. Kuzminykh and Iryna I. Husyeva and Beibei Xu and Shiwei Zhu}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Adaptive Software System for International Activity Level Assessment}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {52--61}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper6.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KovalKHXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KucherovS22, author = {Dmytro P. Kucherov and Tetiana Shmelova}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Monitoring of a Critical Infrastructure Facility by UAVs}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {125--140}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper12.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KucherovS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KuznietsovaB22, author = {Nataliia Kuznietsova and Eduard Bateiko}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Analysis and Development of Mathematical Models for Assessing Investment Risks in Financial Markets}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {92--101}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper9.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KuznietsovaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandePS22, author = {Dmytro Lande and Olexander Puchkov and Ihor Subach}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Method of Detecting Cybersecurity Objects Based on {OSINT} Technology}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {115--124}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper11.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandePS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeSDLLG22, author = {Dmytro Lande and Andrei Snarskii and Oleh O. Dmytrenko and Chen Li and Xianyi Li and Jianping Guo}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Formation of Network of Scientists in Cybersecurity Field}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {11--20}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper2.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeSDLLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/PankratovaS22, author = {Nataliia D. Pankratova and Illia Savchenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Detecting and Constructing Morphological Tables Using Weakly Structured Data Analysis Results}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {42--51}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper5.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/PankratovaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaG22, author = {Julia V. Rogushina and Anatoly Y. Gladun}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Semantic Approach to Decision Making in Comparison of Complex Objects}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {102--114}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper10.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SubachMMKF22, author = {Ihor Subach and Dmytro Mogylevych and Artem Mykytiuk and Volodymyr Kubrak and Vitalii Fesokha}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Models of Fuzzy Identification of Cyber Incidents in Information and Communication Systems by Intelligent {SIEM} Systems}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {151--160}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper14.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SubachMMKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TsyganokAMK22, author = {Vitaliy V. Tsyganok and Anton Astakhov and Volodymyr Minas and Maksym Konovaliuk}, editor = {Aleksandr Dodonov and Dmitry Lande and Vitaliy V. Tsyganok and Nikolai Stoianov and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andriy Olenko and Sergii V. Kadenko and Oleg Chertov and Oleh V. Andriichuk}, title = {Knowledge Transfer Platform Toolkit for Strategic Planning}, booktitle = {Selected Papers of the {XXII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2022), Kyiv, Ukraine, November 16, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3503}, pages = {21--31}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3503/paper3.pdf}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TsyganokAMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/its2/2021, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3241}, urn = {urn:nbn:de:0074-3241-0}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovGK21, author = {Oleksandr Dodonov and Olena Gorbachyk and Maryna Kuznietsova}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Automated Organizational Management Systems of Critical Infrastructure: Security and Functional Stability}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {1--12}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/GalchynskyGD21, author = {Leonid Galchynsky and Mykola Graivoronskyi and Oleh O. Dmytrenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {225--236}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/GalchynskyGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/GladunKM21, author = {Anatoly Y. Gladun and Katerina Khala and Rodrigo Mart{\'{\i}}nez{-}B{\'{e}}jar}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Development of Object's Structured Information Field with Specific Properties for its Semantic Model Building}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {102--111}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/GladunKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoKBDM21, author = {Hryhorii Hnatiienko and Nikolay A. Kiktev and Tatiana Babenko and Alona Desiatko and Larysa Myrutenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {169--180}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoKBDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoST21, author = {Hryhorii Hnatiienko and Vitaliy Snytyuk and Nataliia Tmienova}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Calculation of the Integral Quality Index of a Scientific Event in the Context of the Interests of a Scientific Institution}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {79--91}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KadenkoTSBJA21, author = {Sergii V. Kadenko and Vitaliy V. Tsyganok and Zsombor Sz{\'{a}}doczki and S{\'{a}}ndor Boz{\'{o}}ki and Patrik Juh{\'{a}}sz and Oleh V. Andriichuk}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Improvement of Pair-wise Comparison Methods Based on Graph Theory Concepts}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {46--55}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KadenkoTSBJA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KlymashBOPCH21, author = {Mykhailo Klymash and Liubov Berkman and Serhiy Otrokh and Volodymyr Pilinsky and Oleksandr Chumak and Olena Hryshchenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Increasing the Multi-position Signals Noise Immunity of Mobile Communication Systems Based on High-order Phase Modulation}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {147--157}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KlymashBOPCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KolomytsevKN21, author = {Mykhailo V. Kolomytsev and Nataliia M. Kussul and Svitlana O. Nosok}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Data Protection on Business Intelligence Analytics Platform with Masking Level Adjustment}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {69--78}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KolomytsevKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KovalKHXZ21, author = {Oleksandr V. Koval and Valeriy O. Kuzminykh and Iryna I. Husyeva and Beibei Xu and Shiwei Zhu}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Improving the Efficiency of Typical Scenarios of Analytical Activities}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {123--132}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KovalKHXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KucherovFOOB21, author = {Dmytro Kucherov and Andriy Fesenko and Igor V. Ogirko and Olha I. Ogirk and Andrei Berezkin}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Information Security of Printing Organizations}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {112--122}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KucherovFOOB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KuznietsovaA21, author = {Nataliia Kuznietsova and R{\'{e}}mi Amoroso}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {An Approach to Green Financial Credit Risks Modeling}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {181--192}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KuznietsovaA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KuznietsovaBKL21, author = {Nataliia Kuznietsova and Petro Bidyuk and Maryna Kuznietsova and Jules Lepretre}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Machine Learning Techniques for Fault-tolerance Analysis and Forecasting}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {56--68}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KuznietsovaBKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Matov21, author = {Aleksandr Matov}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Fog Computing Architecture and their Analytical Models in Solving Problem Flows taking into account Failures and Features of Functioning}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {133--146}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Matov21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/MukhinZKB21, author = {Vadym Mukhin and Valerii Zavgorodnii and Yaroslav Kornaga and Lesia Baranovska}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Algorithm for the Information Space Forming and the Evaluation of Input Objects Search Efficiency}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {193--204}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/MukhinZKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/NovikovVSI21, author = {Oleksii Novikov and Georgy Vedmedenko and Iryna Stopochkina and Mykola Ilin}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Cyber Attacks Cascading Effects Simulation for Ukraine Power Grid}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {23--35}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/NovikovVSI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaG21, author = {Julia V. Rogushina and Anatoly Y. Gladun}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Mereological Approach for Formation of "Part-Whole" Relations between Pages of a Semantic Wiki-resource}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {237--247}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper22.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RudnykC21, author = {Taras Rudnyk and Oleg Chertov}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Determining Reasons of Political Rating Changes Based on Twitter Data}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {36--45}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RudnykC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SnarskiiLD21, author = {Andrei Snarskii and Dmytro Lande and Oleh O. Dmytrenko}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Relaxation Time as Unique Characteristic for Networks Clustering}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {13--22}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper2.pdf}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/its2/SnarskiiLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SobolievL21, author = {Artem Soboliev and Dmytro Lande}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Distributed System of Intelligent Content Monitoring Agents}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {205--214}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SobolievL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SubachFMKK21, author = {Ihor Subach and Vitalii Fesokha and Artem Mykytiuk and Volodymyr Kubrak and Stanislav Korotayev}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Simulation Model of a Fuzzy Cyber Attack Detection System}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {92--101}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SubachFMKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ToliupaBOZKD21, author = {Serhii Toliupa and Liubov Berkman and Serhiy Otrokh and Bohdan Zhurakovskyi and Valeriy Kuzminykh and Hanna Dudarieva}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {Formation of Shift Index Vectors of Ring Codes for Information Transmission Security}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {248--257}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper23.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ToliupaBOZKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TsyganokHHKT21, author = {Vitaliy V. Tsyganok and Oleksandr Hryhorenko and Viktor Holota and Maksym Konovaliuk and Olha Tsyhanok}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {An Approach to Security Environment Forecasting Based on Structuring of Foresight Process and on the Method of Goal Dynamic Evaluation of Alternatives}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {158--168}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TsyganokHHKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/YuzefovychTA21, author = {Volodymyr Yuzefovych and Yevheniia Tsybulska and Oleh V. Andriichuk}, editor = {Aleksandr Dodonov and Dmitry Lande and Nikolai Stoianov and Vitaliy V. Tsyganok and S{\'{a}}ndor Boz{\'{o}}ki and Stan Lipovetsky and Andrei A. Snarskii and Andriy Olenko and Oleg Chertov}, title = {One Approach to Formation of Common Information Space Information Resource in Organizational Management Systems}, booktitle = {Selected Papers of the {XXI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2021), Kyiv, Ukraine, December 9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {3241}, pages = {215--224}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3241/paper20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/YuzefovychTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/its2/2020, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2859}, urn = {urn:nbn:de:0074-2859-2}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BabenkoHV20, author = {Tetiana Babenko and Hryhorii Hnatiienko and Vira Vialkova}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Modeling of Information Security System and Automated Assessment of the Integrated Quality of the Impact of Controls on the Functional Stability of the Organizational System}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {188--198}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/BabenkoHV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BaranovskaHDM20, author = {Lesia Baranovska and Dmytro Hyriavets and Kateryna Dovzhanytsia and Vadym Mukhin}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Visualization of Pursuit Differential Game on a Plane}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {99--113}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BaranovskaHDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ChertovM20, author = {Oleg Chertov and Volodymyr Malchykov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {General Case of Wavelet Transform with Reducible Rational Dilation Factor}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {157--167}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ChertovM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovGK20, author = {Aleksandr G. Dodonov and Olena Gorbachyk and Maryna Kuznietsova}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Dynamic Reconfiguration in Automated Organizational Management Systems}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {129--141}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovL20, author = {Aleksandr G. Dodonov and Dmytro V. Lande}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Modeling the Survivability of Network Structures}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {1--10}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoSTV20, author = {Hryhorii Hnatiienko and Vitaliy Snytyuk and Nataliia Tmienova and Oleksii Voloshyn}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Application of Expert Decision-making Technologies for Fair Evaluation in Testing Problems}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {46--60}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoSTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KadenkoTAKF20, author = {Sergii V. Kadenko and Vitaliy V. Tsyganok and Oleh V. Andriichuk and Aleksandr Karabchuk and Minglei Fu}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {An Overview of Decision Support Software: Strategic Planning Perspective}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {142--156}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KadenkoTAKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KuznietsovaB20, author = {Nataliia Kuznietsova and Petro Bidyuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Adaptive Approach to Building Risk Models of Financial Systems}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {85--98}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KuznietsovaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeD20, author = {Dmytro V. Lande and Oleh O. Dmytrenko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Methodology for Extracting of Key Words and Phrases and Building Directed Weighted Networks of Terms with Using Part-of-speech Tagging}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {168--177}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Matov20, author = {Aleksandr Matov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Adaptive Management of the Order in Which Resources are Provided to Cloud Users}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {220--234}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Matov20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/MokhorTP20, author = {Volodymyr Mokhor and Vasyl Tsurkan and Valeriia Pokrovska}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Analysis of Cyber Exercises Approaches}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {61--70}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/MokhorTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/PetrovKBS20, author = {Viacheslav Petrov and Andriy Kryuchyn and Ievgen Beliak and Olexiy Shihovets}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Ensuring Secure Long-term Data Storage}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {11--23}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/PetrovKBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaG20, author = {Julia V. Rogushina and Anatoly Y. Gladun}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Semantic Processing of Metadata for Big Data: Standards, Ontologies and Typical Information Objects}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {114--128}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RudnykC20, author = {Taras Rudnyk and Oleg Chertov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Method for Identifying Twitter Accounts that Have Changed their Opinion about Politicians}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {24--35}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RudnykC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SubachKMK20, author = {Ihor Subach and Volodymyr Kubrak and Artem Mykytiuk and Stanislav Korotayev}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Rule-oriented Method of Cyber Incidents Detection by {SIEM} Based on Fuzzy Logical Inference}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {210--219}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SubachKMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TsyganokSKA20, author = {Vitaliy V. Tsyganok and Mykyta Savchenko and Sergii V. Kadenko and Oleh V. Andriichuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Decentralization of the Issue-based Knowledge Transfer Platform}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {36--45}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TsyganokSKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/YartsevG20, author = {Volodymyr Yartsev and Dmitry Gololobov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Structural Constructions of Computer Engineering Elements in K-valued Logic}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {178--187}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/YartsevG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ZagorodnyukSB20, author = {Sergiy P. Zagorodnyuk and Bohdan Sus and Oleksandr S. Bauzha}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {OpenEMR Based Model of a Organizational Management System for a Medical Institution}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {235--245}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ZagorodnyukSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ZhurakovskyiTOK20, author = {Bohdan Zhurakovskyi and Serhii Toliupa and Serhiy Otrokh and Valeriy Kuzminykh and Hanna Dudarieva and Vladislav Zhurakovskyi}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Coding for Information Systems Security and Viability}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {71--84}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ZhurakovskyiTOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ZubokK20, author = {Vitalii Zubok and Igor Kotsiuba}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov and S{\'{a}}ndor Boz{\'{o}}ki}, title = {Empirical Study of New Metrics for the Internet Route Hijack Risk Assessment}, booktitle = {Selected Papers of the {XX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2020), Kyiv, Ukraine, December 10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2859}, pages = {199--209}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2859/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ZubokK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/its2/2019, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2577}, urn = {urn:nbn:de:0074-2577-8}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AntonishynM19, author = {Mykhailo Antonishyn and Oleksii Misnik}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Analysis of testing approaches to Android mobile application vulnerabilities}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {270--280}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper22.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/AntonishynM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BalaguraKAG19, author = {Iryna V. Balagura and Sergii V. Kadenko and Oleh V. Andriichuk and Ivan V. Gorbov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Defining Potential Academic Expert Groups based on Joint Authorship Networks Using Decision Support Tools}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {222--233}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BalaguraKAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BerkmanOKH19, author = {Liubov Berkman and Serhiy Otrokh and Valeriy Kuzminykh and Olena Hryshchenko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Method of formation shift indexes vector by minimization of polynomials}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {259--269}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BerkmanOKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ChertovM19, author = {Oleg Chertov and Volodymyr Malchykov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Rational Wavelet Transform with Reducible Rational Dilation Factor}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {146--158}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ChertovM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovGK19, author = {Aleksandr G. Dodonov and Olena Gorbachyk and Maryna Kuznietsova}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Survivability of Organizational Management Systems and the Maintenance of Critical Infrastructure Security}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {1--10}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovNPD19, author = {Aleksandr Dodonov and Aleksey Nikiforov and Vladimir Putyatin and Vadim Dodonov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Modeling Complexes of Organizational Management Automated Systems - a Means to Overcome the Management Crisis}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {100--115}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovNPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HavrylovychK19, author = {Mariia Havrylovych and Nataliia Kuznietsova}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Survival analysis methods for churn prevention in telecommunications industry}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {47--58}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HavrylovychK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Hnatiienko19, author = {Hryhorii Hnatiienko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Choice Manipulation in Multicriteria Optimization Problems}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {234--245}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Hnatiienko19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoS19, author = {Hryhorii Hnatiienko and Vitaliy Snytyuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {A posteriori determination of expert competence under uncertainty}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {82--99}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KadenkoTK19, author = {Sergii V. Kadenko and Vitaliy V. Tsyganok and Aleksandr Karabchuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Comparing Efficiency of Expert Data Aggregation Methods}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {116--131}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KadenkoTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KorniyenkoGL19, author = {Bogdan Korniyenko and Liliya Galata and Lesya Ladieva}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Mathematical Model of Threats Resistance in the Critical Information Resources Protection System}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {281--291}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper23.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KorniyenkoGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KovalKV19, author = {Oleksandr Koval and Valeriy Kuzminykh and Maksym Voronko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Standard Analytic Activity Scenarios Optimization based on Subject Area Analysis}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {37--46}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KovalKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeDR19, author = {Dmytro V. Lande and Oleh O. Dmytrenko and Oksana Radziievska}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Determining the Directions of Links in Undirected Networks of Terms}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {132--145}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeDR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Matov19, author = {Aleksandr Matov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Adaptation of cloud computing as optimization of the process of rendering services to users in the conditions of limited computing resources}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {210--221}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Matov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/MokhorBT19, author = {Volodymyr Mokhor and Oleksandr Bakalynskyi and Vasyl Tsurkan}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Probabilistic criterion of information security management system development}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {159--168}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/MokhorBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Rogushina19, author = {Julia V. Rogushina}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Use of Semantic Similarity Estimates for Unstructured Data Analysis}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {246--258}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Rogushina19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaGPS19, author = {Julia V. Rogushina and Anatoly Y. Gladun and Serhii M. Pryima and Oksana V. Strokan}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Ontology-Based Approach to Validation of Learning Outcomes for Information Security Domain}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {21--36}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaGPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SavchenkoTA19, author = {Mykyta Savchenko and Vitaliy V. Tsyganok and Oleh V. Andriichuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {An Approach to Transaction Delegation in Self-protected Decentralized Data Platforms}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {169--188}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SavchenkoTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SubachKM19, author = {Igor Subach and Volodymyr Kubrak and Artem Mykytiuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Methodology of Rational Choice of Security Incident Management System for Building Operational Security Center}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {11--20}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SubachKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TmienovaS19, author = {Nataliia Tmienova and Bogdan Sus}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {System of Intellectual Ukrainian Language Processing}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {199--209}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TmienovaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TokarievTIP19, author = {Volodymyr Tokariev and Vitalii Tkachov and Iryna Ilina and Stanislav Partyka}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Implementation of combined method in constructing a trajectory for structure reconfiguration of a computer system with reconstructible structure and programmable logic}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {71--81}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TokarievTIP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/YartsevG19, author = {Volodymyr Yartsev and Dmitry Gololobov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Protection of data transmission systems from the influence of intersymbol interference of signals}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {59--70}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/YartsevG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/YuzefovychT19, author = {Volodymyr Yuzefovych and Yevheniia Tsybulska}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Modified Exponential Smoothing Method to Improve Course Estimation of a Moving Object}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {189--198}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/YuzefovychT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Zubok19, author = {Vitalii Zubok}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Nikolai T. Stoianov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Building Formal Model of the Internet Routing for Risk Evaluation of Cyberattacks on Global Routing}, booktitle = {Selected Papers of the {XIX} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2019), Kyiv, Ukraine, November 28, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2577}, pages = {292--301}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2577/paper24.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Zubok19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/its2/2018, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2318}, urn = {urn:nbn:de:0074-2318-4}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ArsenovRSC18, author = {Andrey Arsenov and Igor Ruban and Kyrylo Smelyakov and Anastasiya Chupryna}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Evolution of Convolutional Neural Network Architecture in Image Classification Problems}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {35--45}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/ArsenovRSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BalaguraAG18, author = {Iryna V. Balagura and Valentyna B. Andrushchenko and Ivan V. Gorbov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Detection of Expert Groups for Scientific Expertise}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {271--280}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper23.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BalaguraAG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BielievtsovRSS18, author = {Stanislav Bielievtsov and Igor Ruban and Kyrylo Smelyakov and Dmytro Sumtsov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Network Technology for Transmission of Visual Information}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {160--175}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BielievtsovRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ChuryumovTTD18, author = {Genadiy Churyumov and Vitalii Tkachov and Volodymyr Tokariev and Vladyslav Diachenko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Method for Ensuring Survivability of Flying Ad-hoc Network Based on Structural and Functional Reconfiguration}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {64--76}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ChuryumovTTD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovGK18, author = {Aleksandr Dodonov and Olena Gorbachyk and Maryna Kuznietsova}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {{\cyrchar\CYRP}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrshch}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrzh}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyru}{\cyrchar\cyrch}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} {\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm} {\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrg}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrz}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro} {\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrya}{\cyrchar\cyrk} {\cyrchar\cyrsh}{\cyrchar\cyrl}{\cyrchar\cyrya}{\cyrchar\cyrh} {\cyrchar\cyrd}{\cyrchar\cyro} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyrr} (Increasing the Survivability of Automated Systems of Organizational Management as a Way to Security of Critical Infrastructures)}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {261--270}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper22.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovLB18, author = {Aleksandr G. Dodonov and Dmitry V. Lande and Boris Berezin}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Semantic Models at Task Monitoring Public Opinions}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {1--12}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovLB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoS18, author = {Hryhorii Hnatiienko and Oleh Suprun}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Fuzzy Set Objects Clustering Method Using Evolution Technologies}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {129--138}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HnatiienkoSS18, author = {Hryhorii Hnatiienko and Vitaliy Snytyuk and Oleh Suprun}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Application of Decision-making Methods for Evaluation of Complex Information System Functioning Quality}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {25--34}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HnatiienkoSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kadenko18, author = {Sergii V. Kadenko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {A Hybrid Method of Information Aggregation for Community-level Decision-making}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {77--94}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kadenko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KorniyenkoGL18, author = {Bogdan Korniyenko and Liliya Galata and Lesya Ladieva}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {176--187}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KorniyenkoGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KovalSA18, author = {Aleksandr Koval and Safwan Al Salaimeh and Oleh V. Andriichuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Usage of Expert Classification in Diagnostic Expert Systems' Knowledge Bases Construction}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {139--149}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KovalSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KucherovB18, author = {Dmytro Kucherov and Andrii Berezkin}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Protection of Information Networks Based on LoRa Technology}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {107--117}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KucherovB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kuznietsova18, author = {Nataliia Kuznietsova}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Analytical Technologies for Clients' Preferences Analyzing with Incomplete Data Recovering}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {118--128}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kuznietsova18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeDS18, author = {Dmitry V. Lande and Oleh O. Dmytrenko and Andrei Snarskii}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Transformations of Texts into the Complex Network with Applying Visibility Graphs Algorithms}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {95--106}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeYZGW18, author = {Dmitry Lande and Zijiang Yang and Shiwei Zhu and Jianping Guo and Moji Wei}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Automatic Text Summarization of Chinese Legal Information}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {222--238}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeYZGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Matov18, author = {Aleksandr Matov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Mathematical Models of Cloud Computing with Absolute-relative Priorities of Providing of Computer Resources to Users in Conditions of Functioning Features and Failures}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {150--159}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Matov18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/OtrokhKH18, author = {Serhii Otrokh and Valeriy Kuzminykh and Olena Hryshchenko}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Method of Forming the Ring Codes}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {188--198}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/OtrokhKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaGP18, author = {Julia V. Rogushina and Anatoly Jasonovich Gladun and Serhii M. Pryima}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Use of Ontologies for Metadata Records Analysis in Big Data}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {46--63}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SavchenkoTA18, author = {Mykyta Savchenko and Vitaliy V. Tsyganok and Oleh V. Andriichuk}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Decision Support Systems' Security Model Based on Decentralized Data Platforms}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {209--221}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SavchenkoTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/SubachC18, author = {Igor Subach and Alexander Chauzov}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd} {\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrii}{\cyrchar\cyrl}{\cyrchar\cyru} {\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrb}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrc}{\cyrchar\cyrsftsn} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyrya}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrz}{\cyrchar\cyri} {\cyrchar\cyrd}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrr}{\cyrchar\cyrii}{\cyrchar\cyrv}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro} {\cyrchar\cyro}{\cyrchar\cyrb}'{\cyrchar\cyrie}{\cyrchar\cyrm}{\cyrchar\cyru} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrr}{\cyrchar\cyrii}{\cyrchar\cyrz}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyri} {\cyrchar\cyrishrt}{\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrya}{\cyrchar\cyrm}{\cyrchar\cyri} {\cyrchar\cyrz}{\cyrchar\cyrv}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrd}{\cyrchar\cyro} {\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrv} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}-{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrch}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrl}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii} {\cyrchar\CYRA}{\cyrchar\CYRS}{\cyrchar\CYRU} (The Method of Distribution of Tables of a Relational Database of Equal Volume and Different Probabilities of Solving them in the Information and Computing Network of Automated Control Systems)}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {239--250}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper20.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/SubachC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TmienovaS18, author = {Nataliia Tmienova and Bogdan Sus}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {Hardware Data Encryption Complex Based on Programmable Microcontrollers}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {199--208}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TmienovaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/YakovivT18, author = {Ihor Yakoviv and Vitaliy V. Tsyganok}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {A Procedure for Assessing the State of Cybersecurity of Power Grids}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {13--24}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/YakovivT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Zubok18, author = {Vitalii Zubok}, editor = {Aleksandr G. Dodonov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii and Oleg Chertov}, title = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrh}{\cyrchar\cyrii}{\cyrchar\cyrd} {\cyrchar\cyrd}{\cyrchar\cyro} {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyru} {\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrk} {\cyrchar\cyrn}{\cyrchar\cyra} {\cyrchar\cyrg}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyru} {\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyrsh}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyryu} (Metric Approach to Risk Evaluation of Cyberattacks on Global Routing)}, booktitle = {Selected Papers of the {XVIII} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2018), Kyiv, Ukraine, November 27, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2318}, pages = {251--260}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2318/paper21.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Zubok18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/its2/2017, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2067}, urn = {urn:nbn:de:0074-2067-8}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AndrushchenkoB17, author = {Valentyna B. Andrushchenko and Iryna V. Balagura}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRA}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrz} {\cyrchar\cyrp}{\cyrchar\cyru}{\cyrchar\cyrb}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyra}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} {\cyrchar\cyrz}{\cyrchar\cyra} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyrya}{\cyrchar\cyrm}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm} {\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyrp}'{\cyrchar\cyryu}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrn}{\cyrchar\cyra} {\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrz}{\cyrchar\cyrii} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyrii}{\cyrchar\cyrv} Web of Science {\cyrchar\cyrt}{\cyrchar\cyra} Scopus (Analysis of Publication Activity in the Area of Computer Security Based on Web of Science and Scopus Data)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {8--15}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/AndrushchenkoB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/BerezinLP17, author = {Boris A. Berezin and Dmitry V. Lande and Oleh Y. Pavlenko}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRR}{\cyrchar\cyra}{\cyrchar\cyrz}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrb}{\cyrchar\cyro}{\cyrchar\cyrt}{\cyrchar\cyrk}{\cyrchar\cyra}, {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrk}{\cyrchar\cyra} {\cyrchar\cyri} {\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrz}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyre} {\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrg}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrt}{\cyrchar\cyrm}{\cyrchar\cyra} {\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrg}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyri} {\cyrchar\cyrs}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrv} {\cyrchar\cyrd}{\cyrchar\cyrl}{\cyrchar\cyrya} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg}{\cyrchar\cyra} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt}-{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrv} (Development, Evaluation and Usage of Word Segmentation Algorithm for National Internet Resources Monitoring Systems)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {16--22}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/BerezinLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovGK17, author = {Aleksandr G. Dodonov and Olena S. Gorbachyk and Maryna G. Kuznietsova}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRO}{\cyrchar\cyrr}{\cyrchar\cyrg}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrz}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrya} {\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrg}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyryu} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrii}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyro}{\cyrchar\cyrb}'{\cyrchar\cyrie}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyrii}{\cyrchar\cyrv} (Management Organization of Mobile Technical Objects Group)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {1--7}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/GalataKY17, author = {Liliia P. Galata and Bogdan Y. Korniyenko and Alexander K. Yudin}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Research of the Simulation Polygon for the Protection of Critical Information Resources}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {23--31}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/GalataKY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/HumennyiKPR17, author = {Dmytro O. Humennyi and Yurii I. Khlaponin and Igor R. Parkhomey and Olena V. Rudnitska}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Structural Model of Robot-manipulator for Capture of No-cooperative Client Spacecraft}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {32--40}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/HumennyiKPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kadenko17, author = {Sergii V. Kadenko}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Defining Relative Weights of Data Sources during Aggregation of Pair-wise Comparisons}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {47--55}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kadenko17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KhlaponinKKG17, author = {Yurii I. Khlaponin and Volodimir O. Khoroshko and Yuliia E. Khokhlacheva and Evgen V. Gavrilko}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Parametric Monitoring of Computing Processes in Information and Computing Systems}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {125--131}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KhlaponinKKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kucherov17, author = {Dmytro P. Kucherov}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRK}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrzh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrm} {\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyrp}'{\cyrchar\cyryu}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii} (Control of Computer Network Overload)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {69--75}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kucherov17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KuzminykhKO17, author = {Valeriy O. Kuzminykh and Alexander V. Koval and Mark V. Osypenko}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Methods of Machine Training on the Basis of Stochastic Automatic Devices in the Tasks of Consolidation of Data from Unsealed Sources}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {63--68}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KuzminykhKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kuznietsova17, author = {Nataliia V. Kuznietsova}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRII}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrii} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyryi} {\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrz}{\cyrchar\cyru} {\cyrchar\cyrk}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrie}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrz}{\cyrchar\cyri} {\cyrchar\cyra}{\cyrchar\cyrb}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyru}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyryi}{\cyrchar\cyrh} {\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrk}{\cyrchar\cyri} (Information Technologies for Clients' Database Analysis and Behaviour Forecasting)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {56--62}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kuznietsova17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeAHG17, author = {Dmitry V. Lande and Oleh V. Andriichuk and Anastasiya M. Hraivoronska and Natalia A. Guliakina}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Application of Decision-making Support, Nonlinear Dynamics, and Computational Linguistics Methods during Detection of Information Operations}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {76--85}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper11.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeAHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/LandeS17, author = {Dmitry V. Lande and Andrei A. Snarskii}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRP}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyre} {\cyrchar\cyrg}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrv} {\cyrchar\cyrg}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrd}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyri} {\cyrchar\cyrv} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyre} (Usage of Horizontal Visibility Graphs in Information Analytics)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {86--91}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper12.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/LandeS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/MokhorTTH17, author = {Volodymyr V. Mokhor and Oksana V. Tsurkan and Vasyl V. Tsurkan and Rostyslav P. Herasymov}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRO}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrz}{\cyrchar\cyra}{\cyrchar\cyrh}{\cyrchar\cyri}{\cyrchar\cyrshch}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyryi} {\cyrchar\cyrv} {\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyrp}'{\cyrchar\cyryu}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrh} {\cyrchar\cyrz}{\cyrchar\cyra} {\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyro}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrzh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrm} {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrh}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrm} (Information Security Assessment of Computer Systems by Socio-engineering Approach)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {92--98}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/MokhorTTH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaG17, author = {Julia V. Rogushina and Anatoly Y. Gladun}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRV}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro} {\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrz}{\cyrchar\cyru} {\cyrchar\cyrd}{\cyrchar\cyrl}{\cyrchar\cyrya} {\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrd}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\cyrz} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} (Usage of Ontological Analysis for Semantic Marking of Information Security Standards)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {99--104}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RubanCTT17, author = {Igor V. Ruban and Genadiy I. Churyumov and Volodymyr V. Tokarev and Vitaliy M. Tkachov}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRO}{\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrch}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyre} {\cyrchar\cyrzh}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyru}{\cyrchar\cyrch}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyri} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyri}{\cyrchar\cyrg}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyri}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyrery} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyri} {\cyrchar\cyrerev}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrg}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro} {\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyrl}{\cyrchar\cyru}{\cyrchar\cyrch}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrv}{\cyrchar\cyrery}{\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrshch}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyri} (Provision of Survivability of Reconfigurable Mobile System on Exposure to High-Power Electromagnetic Radiation)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {105--111}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper15.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RubanCTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TmienovaII17, author = {Nataliia P. Tmienova and Oleg E. Ilarionov and Nina M. Ilarionova}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Exploring Digital Forensics Tools in Cyborg Hawk Linux}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {118--124}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TmienovaII17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TsyganokBR17, author = {Vitaliy V. Tsyganok and Ihor V. Borokhvostov and Pavlo D. Roik}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRP}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyrn}{\cyrchar\cyro}-{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrya} {\cyrchar\cyrp}{\cyrchar\cyrl}{\cyrchar\cyra}{\cyrchar\cyrt}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra} {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrf}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra} {\cyrchar\cyrz}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrd}{\cyrchar\cyrl}{\cyrchar\cyrya} {\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrv} {\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrch}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyrk}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrh} (Problem-oriented Knowledge Transfer Platform for Decision-making Support in Socio-technical Systems)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {112--117}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper16.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TsyganokBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/TsyganokKA17, author = {Vitaliy V. Tsyganok and Sergii V. Kadenko and Oleh V. Andriichuk}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {Considering Importance of Information Sources during Aggregation of Alternative Rankings}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {132--141}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper19.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/TsyganokKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/ZubokZB17, author = {Vitalii Y. Zubok and Olexandr I. Zakharchenko and Yurii O. Belanov}, editor = {Aleksandr G. Dodonov and Vladimir V. Golenkov and Dmitry V. Lande and Wlodzimierz Khadzhynov and Vitaliy V. Tsyganok and Andrei A. Snarskii}, title = {{\cyrchar\CYRR}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrz}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\cyrv} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}-{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyru}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrh} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrch}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyru} {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrii} {\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrii}{\cyrchar\cyrishrt} (Recognition of Abnormal State in Computer Network Systems with Fuzzy Description of Events)}, booktitle = {Selected Papers of the {XVII} International Scientific and Practical Conference on Information Technologies and Security {(ITS} 2017), Kyiv, Ukraine, November 30, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {2067}, pages = {41--46}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-2067/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/ZubokZB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/its2/2016, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1813}, urn = {urn:nbn:de:0074-1813-0}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AndriichukK16, author = {Oleh V. Andriichuk and Petro T. Kachanov}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrerev}{\cyrchar\cyrk}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyri}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrf}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyri} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh} {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyrishrt} {(A} Methodology for Application of Expert Data-based Decision Support Tools while Identifying Informational Operations)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {40--47}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/AndriichukK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AndrushchenkoBL16, author = {Valentyna B. Andrushchenko and Iryna V. Balagura and Dmitry V. Lande}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRII}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrii} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyri} {\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyru} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyru} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyryu} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrie}{\cyrchar\cyryu}, {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyri} {\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrf}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyryi} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrv} - {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii}, {\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyri}, {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrg}{\cyrchar\cyri} (Information Resources for Scientific Information Access and Exchange, Identification of Scientists - Opportunities, Disadvantages, Benefits)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {62--67}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/AndrushchenkoBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovL16, author = {Aleksandr G. Dodonov and Dmitry V. Lande}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRI}{\cyrchar\cyrs}{\cyrchar\cyrs}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyre} {\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro} {\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrv}{\cyrchar\cyre}{\cyrchar\cyrb}-{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrv} {\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyri} {\cyrchar\CYRI}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt} {(A} Study of Informational Impact Sources of the World Wide Web)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {1--7}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kadenko16, author = {Sergii V. Kadenko}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRM}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyri} {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyrt}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyrii}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrsftsn} {\cyrchar\cyru} {\cyrchar\cyrs}{\cyrchar\cyrf}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} (Prospects and Potential of Expert Decision-making Support Techniques Implementation in Information Security Area)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {8--14}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kadenko16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KhlaponinZ16, author = {Yuriy I. Khlaponin and Genadiy B. Zhyrov}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRA}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrz} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyru}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii} {\cyrchar\cyrn}{\cyrchar\cyra} {\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt} (Analysis and Monitoring of Telecommunication Networks Based on Intelligent Technologies)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {32--39}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KhlaponinZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kuznietsova16, author = {Natalia V. Kuznietsova}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRS}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyryi} {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\cyrsh}{\cyrchar\cyra}{\cyrchar\cyrh}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyra} {\cyrchar\cyrv} {\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrv}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrd}{\cyrchar\cyrii}{\cyrchar\cyrya}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} (Scoring Technology for Risk Assessment of Fraud in Banking)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {54--61}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kuznietsova16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/MokhorBBT16, author = {Vladimir V. Mokhor and Aleksandr M. Bogdanov and Aleksandr O. Bakalinskii and Vasilii V. Tsurkan}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd} {\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrb}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrk} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyre} {\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyra}{\cyrchar\cyrs}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrsftsn}{\cyrchar\cyryu} (The Method of the Design Requirements Formation for Information Security Management System)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {48--53}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/MokhorBBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaGS16, author = {Julia V. Rogushina and Anatoly Y. Gladun and Georgii V. Snigyr}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRO}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrh}{\cyrchar\cyrii}{\cyrchar\cyrd} {\cyrchar\cyrd}{\cyrchar\cyro} {\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrd}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\CYRU}{\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyryi}{\cyrchar\cyrn}{\cyrchar\cyri} {\cyrchar\cyrz} {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt} (Ontological Approach to the Development of National Standards of Ukraine for Evaluation of Information Technology Security)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {15--23}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Tsyganok16, author = {Vitaliy V. Tsyganok}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRP}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrl}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyri} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyro} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyryu} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrm} {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrm} (Decision-Making Support during Planning of Measures for Counteracting Informational Operations)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {24--31}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Tsyganok16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Zubok16, author = {Vitalii Y. Zubok}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRV}{\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyrv}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt}-{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrishrt}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrv} {\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyryi}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii} {\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyru} {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrf}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}: {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} (Worldwide Internet Service Providers in Ukrainian Internet Exchange: Threats and Opportunities)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {68--72}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Zubok16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.