


default search action
CITRisk 2021: Kherson, Ukraine
- Stefan Wolfgang Pickl, Volodymyr Lytvynenko, Maryna Zharikova, Volodymyr Sherstjuk:

Proceedings of the 2nd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2021) co-located with XXI International Conference on Information Technologies in Education and Management (ITEM 2021), Kherson, Ukraine, September 16-17, 2021. CEUR Workshop Proceedings 3101, CEUR-WS.org 2022 - Preface. 1-5

Session 1: Computational Models and Methods for Risk-Informed Systems
- Pavel Khanenko, Peter I. Kogut, Mykola V. Uvarov:

On variational problem with nonstandard growth conditions for the restoration of clouds corrupted satellite images. 6-25 - Tetiana Hovorushchenko:

Method of the software risks management. 26-38 - Sergiy Gnatyuk, Dinara Ospanova, Volodymyr Lytvynenko, Zhazira Amirgaliyeva, Nurali Nabot Shohiyon:

Assessing Risk of Enterprise Bankruptcy by Indicators of Financial and Economic Activity Using Bayesian Networks. 39-50 - Volodymyr V. Hrytsyk, Mariia Nazarkevych:

Research on the increase of information theory in the era of the ending of silicon electronics and new types of risks. 51-64 - Oleksandr Arkhypov, Yevheniia Arkhypova, Jan Krejci:

Adaptation of a risk-based approach to the tasks of building and functioning of information security systems. 65-82 - Maryna Zharikova, Gonzalo Barbeito, Marian Sorin Nistor, Stefan Wolfgang Pickl:

Spatially-distributed multi-hazard risk analysis. 83-92 - Volodymyr Sherstjuk, Maryna Zharikova, Ibraim Didmanidze, Irina Dorovskaja, Svitlana Vyshemyrska:

Risk modeling during complex dynamic system evolution using abstract event network model. 93-110 - Maryna Zharikova, Andrzej Smolarz, Pawel Komada, Volodymyr Sherstyuk, Bohdan Sakovych:

Situation diagnosis based on multi-hazard risk assessment (short paper). 111-118 - Viktor Mashkov, Igor Nevliudov, Yurii Romashov:

Computing the risk of failures for high-temperature pressurized pipelines. 119-136
Session 2: Intelligent Information Technologies for Risk-Informed Systems
- Iurii Krak, Hrygorii Kudin, Mykola Efremov, Alexander Samoylov, Vladislav A. Kuznetsov, Yedilkhan Amirgaliyev, Veda Kasianiuk:

Hyperplane clasterization of the small data based on pseudo-inverse and projective matrices (short paper). 137-145 - Oleksandr Tymchenko, Bohdana Havrysh, Andrian Kobevko, Orest Khamula:

Method of construction of fuzzy tree of solutions for network protection against DoS-attacks. 146-157 - Vsevolod Senkivskyy, Sergii Babichev, Iryna Pikh, Alona Kudriashova, Nataliia Senkivska, Iryna Kalynii:

Forecasting the reader's demand level based on factors of interest in the book. 158-175 - Tatiana Neskorodieva, Eugene Fedorov, Pavlo Rymar, Oleksii Smirnov:

Neural network modeling method of transformations data of audit production with returnable waste. 176-191 - Olexiy Azarov, Leonid Krupelnitskyi, Hanna Rakytyanska, Jan Fesl:

Reconstruction of acoustic surfaces from incomplete data as an identification problem based on fuzzy relations. 192-207 - Nataliya Boyko, Anastasiia Hrynyshyn:

Using recurrent neural network to noise absorption from audio files. 208-226 - Nataliya Boyko, Mariia Rizhko:

Application of semantic segmentation of clouds of points for preservation of cultural heritage. 227-240 - Volodymyr Sherstjuk, Libor Dostálek, Raisa Zakharchenko, Leonid Zakharchenko, Olena Shtutsa, Kostiantyn Sokol:

The use of a neural network to minimize the risks of positive assessment of academically dishonest students. 245-252 - Dmitriy Klyushin, Pavel Yakovlev:

Novel test for survival data analysis of cancer patients (short paper). 253-259
Session 3: Information Technologies for Diagnostic, Modeling, and Monitoring
- Anastasiya Doroshenko, Kvitoslava Obelovska, Olha Bilyk:

Risk analysis of personal data loss in wireless sensor networks. 260-274 - Orken Mamyrbayev, Anzhelika Azarova, Liliia Nikiforova, Aliya Kalizhanova, Anatolii Shyian, Olga Ruzakova, Nataliia Savina:

Mathematical model and method of enterprise financial risk assessment based on threshold elements. 275-291 - Oleksandra S. Bulgakova, Viktor Mashkov, Viacheslav V. Zosimov, Pavlo Popravkin:

Risk of Information Loss using JWT token (short paper). 292-299 - Viktor Perederyi, Eugene Borchik, Waldemar Wójcik, Oksana Ohnieva:

Assessment and information security provision of the decision support process in technogenic object management systems. 300-313 - Sergii Babichev, Tetiana V. Kril, Stella B. Shekhunova, Waldemar Wójcik:

Geo-informational approach to risk analysis of slope mass movement (short paper). 314-321 - Ivan Ostroumov, Oleg Ivashchuk, Sergii Babichev:

Risk of mid-air collision estimation using minimum spanning tree of air traffic graph. 322-334 - Tetiana Shmelova, Nina Rizun, Svitlana Kredentsar, Maksym Yastrub:

Enhancement of the methodology for the selection of the optimal location of the Remote Tower Centre. 335-346 - Tetiana Shmelova, Antonio Chialastri, Yuliya Sikirda, Maxim Yatsko:

Models of decision-making by the pilot in emergency "Engine failure during take-off". 347-365 - Svitlana Bordiuzhenko, Oleksandr Sobol, Olena Liashevska, Dimiter Velev, Plamena Zlateva:

Development of a mobile application for calculation of fire risks in the Android Studio environment (short paper). 366-373 - Jan Fesl, Lyubov Tupychak, Lubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Olga Fedevych:

Information technologies for operational staff training for man-made systems under threats and risks. 374-387 - Nadia Pasieka, Zora Ríhová, Marta Vohnoutová, Nelly Lysenko, Oleksandra Lysenko, Vasyl Sheketa, Mykola Pasyeka, Nataliia Kulchytska:

Designing risk resilient networked high-load computing web-systems for information flow processing. 388-403 - Lubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Volodymyr Sabat, Olga Fedevych:

Information technology of risk assessment for automated control systems of printing production. 404-418 - Lubomir Sikora, Natalia Lysa, Jan Krejcí, Rostislav Tkachuk, Olga Fedevych:

Cognitive and information decision-making technologies and risk assessment in technogenic systems. 419-433 - Andrzej Smolarz, Nadia Pasieka, Andrzej Kotyra, Vasyl Sheketa, Mykola Pasieka, Svitlana Chupakhina, Petro Krul, Mykola Suprun:

Using hash functions to protect critical messages from changes in risky computing systems. 434-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














