


default search action
CPITS II 2021: Kyiv, Ukraine
- Anatoly Bessalov, Dmytro Ageyev, Valeriy Lahno, Volodymyr Sokolov:

Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume I co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), Kyiv, Ukraine, October 26, 2021 (online). CEUR Workshop Proceedings 3187, CEUR-WS.org 2022 - Tetiana Neskorodieva, Eugene Fedorov, Oleksii Smirnov, Kostiantyn Rudakov, Anastasiia Neskorodieva:

Method Detection Audit Data Anomalies on Basis Restricted Cauchy Machine. 1-12 - Adilia Batorshyna, Volodymyr Tokar, Natalia Kotenko, Serhii Chekhovych, Andrii Homotiuk:

The Impact of Awareness Stimulating Activities and Events on Global Islamic Finance Assets: Enhancing Financial Risk Management and Economic Security in Non-Muslim Countries. 13-26 - Anatolii Morozov, Alla Hrebennyk, Elen Trunova, Igor Skiter, Evgen Hulak:

Design of Industry Centers of Cyber Security of Facilities of Critical Infrastructure. 27-37 - Volodymyr Tokar, Ellana Molchanova, Yuliia Honcharova, Tetiana Zhyrova, Kateryna Ilikchiieva:

Fostering Gender Equality to Stimulate Economic Growth: Legal and Institutional Measures to Enhance Economic Security of EU Member-states and Ukraine. 38-47 - Dmytro Proskurin, Sergiy Gnatyuk, Madina Bauyrzhan:

Distributive Training can Improve Neural Network Performance based on RL-CNN Architecture. 48-57 - Nadia Pasieka, Vasyl Sheketa, Myroslava Kulynych, Yulia Romanyshyn, Svitlana Chupakhina, Olha Khytrova:

Machine Training for Intelligent Analysis of Text for the Identification of the Author. 58-68 - Nataliia V. Morze, Mariia Boiko, Liliia Varchenko-Trotsenko, Viktoriia Vember:

Formation of Internet Resources Critical Evaluation Skills of Future Primary School Teachers. 69-78 - Ihor Subach, Dmytro Mogylevych, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev:

Design Methodology of Cybersecurity Situational Center. 79-88 - Ivan Chychkan, Svitlana Spasiteleva, Svitlana Shevchenko, Yuliia Zhdanova, Halyna Shevchenko:

Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation. 89-102 - Mariia Astafieva, Dmytro Bodnenko, Oksana Lytvyn, Volodymyr Proshkin, Oleksii B. Zhyltsov:

Mathematical Modeling as a Tool for Interdisciplinary Training of Computer Sciences and Cybersecurity Students. 103-116 - Mykola Khudyntsev, Andrii Davydiuk, Oleksiy Lebid, Oleksandr Trofymchuk, Artem Zhylin:

Cybersecurity Indices: Review and Classification. 117-126 - Sergiy Gnatyuk, Rat Berdibayev, Ivan Azarov, Nazerke Baisholan, Iryna Lozova:

Modern Types of Databases for SIEM System Development. 127-138 - Maksim Iavich, Giorgi Iashvili, Zhadyra Avkurova, Serhii Dorozhynskyi, Andriy Fesenko:

Machine Learning Algorithms for 5G Networks Security and the Corresponding Testing Environment. 139-149 - Vasyl Trysnyuk, Kirill Smetanin, Ihor Humeniuk, Oleksii Samchyshyn, Taras Trysnyuk:

Information Encryption Method based on a Combination of Steganographic and Cryptographic Algorithm's Features. 150-159 - Maksim Iavich, Dinara Ospanova, Ketevan Grdzelidze, Rashit Brzhanov, Yuliia Polishchuk:

Advanced Data Security and Privacy Ensuring Methods in 5G Era. 160-169 - Tatiana Prokopenko, Yaroslav Tarasenko, Olha Lavdanska, Serhii Rudnytskyi, Yuliia Rudnytska:

Developing the Comprehensive Technology for Alternative Management of Complex Organizational and Technological Objects in the Conditions of Cyber Threats. 170-181 - Volodymyr Rudnytskyi, Vira Babenko, Nataliia Lada, Yaroslav Tarasenko, Yuliia Rudnytska:

Constructing Symmetric Operations of Cryptographic Information Encoding. 182-194 - Vitalii Savchenko, Oleksander Matsko, Ivan Havryliuk, Kseniia Yerhidzei, Iryna Novikova:

Two-Parametric Model for Detecting Slow HTTP DDoS Attacks based on Predicting User Behavior. 195-205 - Nurgul A. Seilova, Almas Kungozhin, Renat Ibrayev, Lev Gorlov, Zhandar Ospanov, Ruslan Itemirov, Igor Kiyashko:

About Cryptographic Properties of the Qalqan Encryption Algorithm. 206-215 - Ievgen Iosifov, Olena Iosifova, Volodymyr Sokolov, Pavlo Skladannyi, Igor Sukaylo:

Natural Language Technology to Ensure the Safety of Speech Information. 216-226 - Volodymyr Saiko, Serhii Toliupa, Volodymyr Nakonechnyi, Mykola Brailovskyi, Teodor Narytnik:

Method of Increasing the Efficiency of Managing Energy Potential Protected Radioliniy Terahertz Range using Artificial Intelligence (short paper). 227-235 - Valeriy Lakhno, Andrii Blozva, Dmytro Kasatkin, Dmitro Tyshchenko, Tamara Franchuk:

Modified Genetic Algorithm for Solving the Problem of Selecting Hardware and Software for Information Security (short paper). 236-243 - Igor Skiter, Hennadii Hulak, Viktor Grechaninov, Vitalii Klymenko, Nikolay Ievlev:

System Approach to the Creation of Cybersecurity Centers of Critical Infrastructure (short paper). 244-250 - Yevhen Ivanichenko, Valerii Kozachok, Yurii Dreis, Olena Nesterova, Kate Dmytriienko:

Exposing Deviations in Information Processes using Multifractal Analysis (short paper). 251-259 - Valeriia V. Loiko, Olena S. Aleksandrova, Vitalii N. Zavadskyi, Tatiana Bezprozvanna, Kateryna Pozdieieva:

Risk Analysis and Determination of the Security Level of the Information Ecosystem of the Educational Institution with the Help of an Expert System (short paper). 260-267 - Andrii Sahun, Vladyslav Khaidurov, Pavlo Gikalo:

Improving the RC5RA Algorithm's Crypto Resistance for Embedded Computers (short paper). 268-275 - Olena Nehodenko, Svitlana Shevchenko, Nataliia Trintina, Volodymyr Astapenya, Oleksandr Tereshchenko:

Problematic Issues of Approximation and Interpolation in Signal Processing in Secure Information Systems (short paper). 276-283 - Sergiy Obushnyi, Denis Virovets, Hennadii Hulak, Artem Platonenko, Roman Kyrychok:

Ensuring Data Security in the Peer-to-Peer Economic System of the DAO (short paper). 284-292 - Stanislav Dovgiy, Oleh Kopiika, Oleksii Kozlov:

Architectures for the Information Systems, Network Resources, and Network Services (short paper). 293-301 - Anatoly Bessalov, Volodymyr Sokolov, Pavlo Skladannyi, Nataliia Mazur, Dmytro Ageyev:

Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves. 302-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














