Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/its2/its2016.bht:"
@proceedings{DBLP:conf/its2/2016, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1813}, urn = {urn:nbn:de:0074-1813-0}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AndriichukK16, author = {Oleh V. Andriichuk and Petro T. Kachanov}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyru}{\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrerev}{\cyrchar\cyrk}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyri}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrf}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyri} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh} {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyrishrt} {(A} Methodology for Application of Expert Data-based Decision Support Tools while Identifying Informational Operations)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {40--47}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:18 +0100}, biburl = {https://dblp.org/rec/conf/its2/AndriichukK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/AndrushchenkoBL16, author = {Valentyna B. Andrushchenko and Iryna V. Balagura and Dmitry V. Lande}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRII}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrii} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyri} {\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyru} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyru} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyryu} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrie}{\cyrchar\cyryu}, {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyri} {\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrf}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyryi} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrv} - {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii}, {\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyri}, {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrg}{\cyrchar\cyri} (Information Resources for Scientific Information Access and Exchange, Identification of Scientists - Opportunities, Disadvantages, Benefits)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {62--67}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper9.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/AndrushchenkoBL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/DodonovL16, author = {Aleksandr G. Dodonov and Dmitry V. Lande}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRI}{\cyrchar\cyrs}{\cyrchar\cyrs}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrd}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyre} {\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrv} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyro} {\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrv}{\cyrchar\cyre}{\cyrchar\cyrb}-{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyru}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyro}{\cyrchar\cyrv} {\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyri} {\cyrchar\CYRI}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt} {(A} Study of Informational Impact Sources of the World Wide Web)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {1--7}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/DodonovL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kadenko16, author = {Sergii V. Kadenko}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRM}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyri} {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrs}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrm}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyrt}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyrii}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyrsftsn} {\cyrchar\cyru} {\cyrchar\cyrs}{\cyrchar\cyrf}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} (Prospects and Potential of Expert Decision-making Support Techniques Implementation in Information Security Area)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {8--14}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kadenko16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/KhlaponinZ16, author = {Yuriy I. Khlaponin and Genadiy B. Zhyrov}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRA}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrii}{\cyrchar\cyrz} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}{\cyrchar\cyru}{\cyrchar\cyrn}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyryi} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii} {\cyrchar\cyrn}{\cyrchar\cyra} {\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyru}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt} (Analysis and Monitoring of Telecommunication Networks Based on Intelligent Technologies)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {32--39}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/KhlaponinZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Kuznietsova16, author = {Natalia V. Kuznietsova}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRS}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrg}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyrii} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyryi} {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrz}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\cyrsh}{\cyrchar\cyra}{\cyrchar\cyrh}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyra} {\cyrchar\cyrv} {\cyrchar\cyrb}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrv}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrd}{\cyrchar\cyrii}{\cyrchar\cyrya}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} (Scoring Technology for Risk Assessment of Fraud in Banking)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {54--61}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper8.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Kuznietsova16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/MokhorBBT16, author = {Vladimir V. Mokhor and Aleksandr M. Bogdanov and Aleksandr O. Bakalinskii and Vasilii V. Tsurkan}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRM}{\cyrchar\cyre}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrd} {\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrb}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrk} {\cyrchar\cyrs}{\cyrchar\cyri}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrm}{\cyrchar\cyre} {\cyrchar\cyru}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrv}{\cyrchar\cyrl}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrishrt} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyra}{\cyrchar\cyrs}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrsftsn}{\cyrchar\cyryu} (The Method of the Design Requirements Formation for Information Security Management System)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {48--53}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/MokhorBBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/RogushinaGS16, author = {Julia V. Rogushina and Anatoly Y. Gladun and Georgii V. Snigyr}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRO}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrch}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrii}{\cyrchar\cyrd}{\cyrchar\cyrh}{\cyrchar\cyrii}{\cyrchar\cyrd} {\cyrchar\cyrd}{\cyrchar\cyro} {\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrz}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyra}{\cyrchar\cyrl}{\cyrchar\cyrsftsn}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrd}{\cyrchar\cyra}{\cyrchar\cyrr}{\cyrchar\cyrt}{\cyrchar\cyrii}{\cyrchar\cyrv} {\cyrchar\CYRU}{\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyryi}{\cyrchar\cyrn}{\cyrchar\cyri} {\cyrchar\cyrz} {\cyrchar\cyro}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyryu}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrya} {\cyrchar\cyrb}{\cyrchar\cyre}{\cyrchar\cyrz}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyrii}{\cyrchar\cyrishrt}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrh} {\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrh}{\cyrchar\cyrn}{\cyrchar\cyro}{\cyrchar\cyrl}{\cyrchar\cyro}{\cyrchar\cyrg}{\cyrchar\cyrii}{\cyrchar\cyrishrt} (Ontological Approach to the Development of National Standards of Ukraine for Evaluation of Information Technology Security)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {15--23}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper3.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/RogushinaGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Tsyganok16, author = {Vitaliy V. Tsyganok}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRP}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrzh}{\cyrchar\cyrk}{\cyrchar\cyra} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrya} {\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrsh}{\cyrchar\cyre}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrp}{\cyrchar\cyrl}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrn}{\cyrchar\cyri}{\cyrchar\cyri} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrishrt} {\cyrchar\cyrp}{\cyrchar\cyro} {\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrt}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrishrt}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyryu} {\cyrchar\cyri}{\cyrchar\cyrn}{\cyrchar\cyrf}{\cyrchar\cyro}{\cyrchar\cyrr}{\cyrchar\cyrm}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyro}{\cyrchar\cyrn}{\cyrchar\cyrn}{\cyrchar\cyrery}{\cyrchar\cyrm} {\cyrchar\cyro}{\cyrchar\cyrp}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrc}{\cyrchar\cyri}{\cyrchar\cyrya}{\cyrchar\cyrm} (Decision-Making Support during Planning of Measures for Counteracting Informational Operations)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {24--31}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper4.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Tsyganok16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/its2/Zubok16, author = {Vitalii Y. Zubok}, editor = {Aleksandr G. Dodonov and Aleksandr M. Bogdanov and Vladimir V. Golenkov and Dmitry V. Lande and Vladimir V. Mokhor and Nikolay A. Ozhevan and Vitaliy V. Tsyganok and Vladimir N. Furashev and Elena S. Gorbachyk and Marina G. Kuznetsova}, title = {{\cyrchar\CYRV}{\cyrchar\cyrs}{\cyrchar\cyre}{\cyrchar\cyrs}{\cyrchar\cyrv}{\cyrchar\cyrii}{\cyrchar\cyrt}{\cyrchar\cyrn}{\cyrchar\cyrii} {\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyrt}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyrn}{\cyrchar\cyre}{\cyrchar\cyrt}-{\cyrchar\cyrp}{\cyrchar\cyrr}{\cyrchar\cyro}{\cyrchar\cyrv}{\cyrchar\cyra}{\cyrchar\cyrishrt}{\cyrchar\cyrd}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyri} {\cyrchar\cyrv} {\cyrchar\cyru}{\cyrchar\cyrk}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyryi}{\cyrchar\cyrn}{\cyrchar\cyrs}{\cyrchar\cyrsftsn}{\cyrchar\cyrk}{\cyrchar\cyrii}{\cyrchar\cyrishrt} {\cyrchar\cyrm}{\cyrchar\cyre}{\cyrchar\cyrr}{\cyrchar\cyre}{\cyrchar\cyrzh}{\cyrchar\cyrii} {\cyrchar\cyro}{\cyrchar\cyrb}{\cyrchar\cyrm}{\cyrchar\cyrii}{\cyrchar\cyrn}{\cyrchar\cyru} {\cyrchar\cyrt}{\cyrchar\cyrr}{\cyrchar\cyra}{\cyrchar\cyrf}{\cyrchar\cyrii}{\cyrchar\cyrk}{\cyrchar\cyro}{\cyrchar\cyrm}: {\cyrchar\cyrv}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrk}{\cyrchar\cyri} {\cyrchar\cyrt}{\cyrchar\cyra} {\cyrchar\cyrm}{\cyrchar\cyro}{\cyrchar\cyrzh}{\cyrchar\cyrl}{\cyrchar\cyri}{\cyrchar\cyrv}{\cyrchar\cyro}{\cyrchar\cyrs}{\cyrchar\cyrt}{\cyrchar\cyrii} (Worldwide Internet Service Providers in Ukrainian Internet Exchange: Threats and Opportunities)}, booktitle = {Selected Papers of the {XVI} International Scientific and Practical Conference "Information Technologies and Security" {(ITS} 2016), Kyiv, Ukraine, December 1, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1813}, pages = {68--72}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1813/paper10.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/its2/Zubok16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.