Search dblp for Publications

export results for "toc:db/conf/its2/its2016.bht:"

 download as .bib file

@proceedings{DBLP:conf/its2/2016,
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1813},
  urn          = {urn:nbn:de:0074-1813-0},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/AndriichukK16,
  author       = {Oleh V. Andriichuk and
                  Petro T. Kachanov},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyra}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyrerev}{\cyrchar\cyrk}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyri}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyri}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrf}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyri}
                  {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh}
                  {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyrishrt}
                  {(A} Methodology for Application of Expert Data-based Decision Support
                  Tools while Identifying Informational Operations)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {40--47},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:18 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/AndriichukK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/AndrushchenkoBL16,
  author       = {Valentyna B. Andrushchenko and
                  Iryna V. Balagura and
                  Dmitry V. Lande},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRII}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrii}
                  {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyri}
                  {\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyru}
                  {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyru}
                  {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyryu}
                  {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrie}{\cyrchar\cyryu},
                  {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyri}
                  {\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrf}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyryi}
                  {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrv}
                  - {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii},
                  {\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyri},
                  {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrg}{\cyrchar\cyri}
                  (Information Resources for Scientific Information Access and Exchange,
                  Identification of Scientists - Opportunities, Disadvantages, Benefits)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {62--67},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper9.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/AndrushchenkoBL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/DodonovL16,
  author       = {Aleksandr G. Dodonov and
                  Dmitry V. Lande},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRI}{\cyrchar\cyrs}{\cyrchar\cyrs}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyre}
                  {\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}
                  {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro}
                  {\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyrv}{\cyrchar\cyre}{\cyrchar\cyrb}-{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrv}
                  {\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyri} {\cyrchar\CYRI}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt}
                  {(A} Study of Informational Impact Sources of the World Wide Web)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {1--7},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/DodonovL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/Kadenko16,
  author       = {Sergii V. Kadenko},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRM}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii}
                  {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyri}
                  {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya}
                  {\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh}
                  {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyrk}{\cyrchar\cyri}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyrt}{\cyrchar\cyrya}
                  {\cyrchar\cyrr}{\cyrchar\cyrii}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrsftsn}
                  {\cyrchar\cyru} {\cyrchar\cyrs}{\cyrchar\cyrf}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrii}
                  {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi}
                  {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri}
                  (Prospects and Potential of Expert Decision-making Support Techniques
                  Implementation in Information Security Area)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {8--14},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper2.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/Kadenko16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/KhlaponinZ16,
  author       = {Yuriy I. Khlaponin and
                  Genadiy B. Zhyrov},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRA}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrz}
                  {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg}
                  {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyru}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi}
                  {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii}
                  {\cyrchar\cyrn}{\cyrchar\cyra} {\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii}
                  {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh}
                  {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt}
                  (Analysis and Monitoring of Telecommunication Networks Based on Intelligent
                  Technologies)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {32--39},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/KhlaponinZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/Kuznietsova16,
  author       = {Natalia V. Kuznietsova},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRS}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii}
                  {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyryi}
                  {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya}
                  {\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrv}
                  {\cyrchar\cyrsh}{\cyrchar\cyra}{\cyrchar\cyrh}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyra}
                  {\cyrchar\cyrv} {\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrv}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrd}{\cyrchar\cyrii}{\cyrchar\cyrya}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii}
                  (Scoring Technology for Risk Assessment of Fraud in Banking)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {54--61},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper8.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/Kuznietsova16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/MokhorBBT16,
  author       = {Vladimir V. Mokhor and
                  Aleksandr M. Bogdanov and
                  Aleksandr O. Bakalinskii and
                  Vasilii V. Tsurkan},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd}
                  {\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh}
                  {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrb}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrk} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyre}
                  {\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyra}{\cyrchar\cyrs}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrsftsn}{\cyrchar\cyryu}
                  (The Method of the Design Requirements Formation for Information Security
                  Management System)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {48--53},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper7.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/MokhorBBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/RogushinaGS16,
  author       = {Julia V. Rogushina and
                  Anatoly Y. Gladun and
                  Georgii V. Snigyr},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRO}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrh}{\cyrchar\cyrii}{\cyrchar\cyrd}
                  {\cyrchar\cyrd}{\cyrchar\cyro} {\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrk}{\cyrchar\cyri}
                  {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh}
                  {\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrd}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrii}{\cyrchar\cyrv}
                  {\cyrchar\CYRU}{\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyryi}{\cyrchar\cyrn}{\cyrchar\cyri}
                  {\cyrchar\cyrz} {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya}
                  {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri}
                  {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh}
                  {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt}
                  (Ontological Approach to the Development of National Standards of
                  Ukraine for Evaluation of Information Technology Security)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {15--23},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper3.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/RogushinaGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/Tsyganok16,
  author       = {Vitaliy V. Tsyganok},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRP}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyra}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya}
                  {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrl}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyri}
                  {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrp}{\cyrchar\cyro} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyryu}
                  {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrm}
                  {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrm}
                  (Decision-Making Support during Planning of Measures for Counteracting
                  Informational Operations)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {24--31},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper4.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/Tsyganok16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/its2/Zubok16,
  author       = {Vitalii Y. Zubok},
  editor       = {Aleksandr G. Dodonov and
                  Aleksandr M. Bogdanov and
                  Vladimir V. Golenkov and
                  Dmitry V. Lande and
                  Vladimir V. Mokhor and
                  Nikolay A. Ozhevan and
                  Vitaliy V. Tsyganok and
                  Vladimir N. Furashev and
                  Elena S. Gorbachyk and
                  Marina G. Kuznetsova},
  title        = {{\cyrchar\CYRV}{\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyrv}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyrii}
                  {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt}-{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrishrt}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyri}
                  {\cyrchar\cyrv} {\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyryi}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrishrt}
                  {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii}
                  {\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyru}
                  {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrf}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}:
                  {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyri}
                  {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii}
                  (Worldwide Internet Service Providers in Ukrainian Internet Exchange:
                  Threats and Opportunities)},
  booktitle    = {Selected Papers of the {XVI} International Scientific and Practical
                  Conference "Information Technologies and Security" {(ITS} 2016), Kyiv,
                  Ukraine, December 1, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1813},
  pages        = {68--72},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1813/paper10.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/its2/Zubok16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics