


default search action
21st ITS 2021: Kyiv, Ukraine
- Aleksandr Dodonov, Dmitry Lande, Nikolai Stoianov, Vitaliy V. Tsyganok, Sándor Bozóki, Stan Lipovetsky, Andrei A. Snarskii, Andriy Olenko, Oleg Chertov:

Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS 2021), Kyiv, Ukraine, December 9, 2021. CEUR Workshop Proceedings 3241, CEUR-WS.org 2022 - Oleksandr Dodonov, Olena Gorbachyk, Maryna Kuznietsova:

Automated Organizational Management Systems of Critical Infrastructure: Security and Functional Stability. 1-12 - Andrei Snarskii, Dmytro Lande, Oleh O. Dmytrenko:

Relaxation Time as Unique Characteristic for Networks Clustering. 13-22 - Oleksii Novikov, Georgy Vedmedenko, Iryna Stopochkina, Mykola Ilin:

Cyber Attacks Cascading Effects Simulation for Ukraine Power Grid. 23-35 - Taras Rudnyk, Oleg Chertov:

Determining Reasons of Political Rating Changes Based on Twitter Data. 36-45 - Sergii V. Kadenko, Vitaliy V. Tsyganok, Zsombor Szádoczki, Sándor Bozóki, Patrik Juhász, Oleh V. Andriichuk:

Improvement of Pair-wise Comparison Methods Based on Graph Theory Concepts. 46-55 - Nataliia Kuznietsova, Petro Bidyuk, Maryna Kuznietsova, Jules Lepretre:

Machine Learning Techniques for Fault-tolerance Analysis and Forecasting. 56-68 - Mykhailo V. Kolomytsev, Nataliia Kussul, Svitlana O. Nosok:

Data Protection on Business Intelligence Analytics Platform with Masking Level Adjustment. 69-78 - Hryhorii Hnatiienko, Vitaliy Snytyuk, Nataliia Tmienova:

Calculation of the Integral Quality Index of a Scientific Event in the Context of the Interests of a Scientific Institution. 79-91 - Ihor Subach, Vitalii Fesokha, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev:

Simulation Model of a Fuzzy Cyber Attack Detection System. 92-101 - Anatoly Y. Gladun, Katerina Khala, Rodrigo Martínez-Béjar:

Development of Object's Structured Information Field with Specific Properties for its Semantic Model Building. 102-111 - Dmytro Kucherov, Andriy Fesenko, Igor V. Ogirko, Olha I. Ogirk, Andrei Berezkin:

Information Security of Printing Organizations. 112-122 - Oleksandr V. Koval, Valeriy O. Kuzminykh, Iryna I. Husyeva, Beibei Xu, Shiwei Zhu:

Improving the Efficiency of Typical Scenarios of Analytical Activities. 123-132 - Aleksandr Matov:

Fog Computing Architecture and their Analytical Models in Solving Problem Flows taking into account Failures and Features of Functioning. 133-146 - Mykhailo Klymash, Liubov Berkman, Serhiy Otrokh, Volodymyr Pilinsky, Oleksandr Chumak, Olena Hryshchenko:

Increasing the Multi-position Signals Noise Immunity of Mobile Communication Systems Based on High-order Phase Modulation. 147-157 - Vitaliy V. Tsyganok, Oleksandr Hryhorenko, Viktor Holota, Maksym Konovaliuk, Olha Tsyhanok:

An Approach to Security Environment Forecasting Based on Structuring of Foresight Process and on the Method of Goal Dynamic Evaluation of Alternatives. 158-168 - Hryhorii Hnatiienko, Nikolay A. Kiktev, Tatiana Babenko, Alona Desiatko, Larysa Myrutenko:

Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data. 169-180 - Nataliia Kuznietsova, Rémi Amoroso:

An Approach to Green Financial Credit Risks Modeling. 181-192 - Vadym E. Mukhin, Valerii Zavgorodnii, Yaroslav Kornaga, Lesia Baranovska:

Algorithm for the Information Space Forming and the Evaluation of Input Objects Search Efficiency. 193-204 - Artem Soboliev, Dmytro Lande:

Distributed System of Intelligent Content Monitoring Agents. 205-214 - Volodymyr Yuzefovych, Yevheniia Tsybulska, Oleh V. Andriichuk:

One Approach to Formation of Common Information Space Information Resource in Organizational Management Systems. 215-224 - Leonid Galchynsky, Mykola Graivoronskyi, Oleh O. Dmytrenko:

Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT. 225-236 - Julia V. Rogushina, Anatoly Y. Gladun:

Mereological Approach for Formation of "Part-Whole" Relations between Pages of a Semantic Wiki-resource. 237-247 - Serhii Toliupa, Liubov Berkman, Serhiy Otrokh, Bohdan Zhurakovskyi, Valeriy Kuzminykh, Hanna Dudarieva:

Formation of Shift Index Vectors of Ring Codes for Information Transmission Security. 248-257

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














