


default search action
CPITS II 2021: Kyiv, Ukraine
- Anatoly Bessalov, Dmytro Ageyev, Valeriy Lahno, Volodymyr Sokolov:

Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II. Volume II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2021), Kyiv, Ukraine, October 26, 2021 (online). CEUR Workshop Proceedings 3188, CEUR-WS.org 2022 - Igor Zhukov, Oleksii Synelnikov, Olena Chaikovska, Serhiy Dorozhynskyi:

Modern Approaches to Software Optimization Methods. 1-10 - Oleksandr Tereshchenko, Natalia Trintina:

Development Principles of Secure Microservices. 11-20 - Euvgenia Nosova, Lyudmyla Anisimova, Tetiana Murovana, Yulia Sviatiuk, Olena Iafinovych:

Information Security System in Provision of the Economic Security and Risk Management of the Enterprise. 21-31 - Mykyta Moshenchenko, Bohdan Zhurakovskyi, Vadym Poltorak, Andrii Bondarchuk, Nataliia Korshun:

Optimization Algorithms of Smart City Wireless Sensor Network Control. 32-42 - Mariia Nazarkevych, Volodymyr V. Hrytsyk, Maryna Kostiak, Lyubomyr Parkhuts, Hanna Nazarkevych:

Biometric Protection Information System with Extension of Segmentation Methods. 43-52 - Oleksandr Trush, Mariy Trush, Oleh Shincaruk, Hryhorii Radzivilov, Tetiana S. Opryshko:

Аnalysis of Corporate Culture Development Parameters in the Telecommunication Enterprise Informations. 53-62 - Iryna Kreidych, leksandr Kharchenko, Oksana Kazak:

Solvency Management in the Financial Security System of Housing and Communal Services. 63-75 - Vyktoriia Marhasova, Stanislav Maliar, Mukola Ivanov, Olga Garafonova, Olena Kozyrieva:

IT Team Building Process Management based on a Competency Approach. 76-87 - Maryna Chyzhevska, Nataliia Romanovska, Andrii Ramskyi, Vitalii Venger, Mykola Obushnyi:

Behavioral Biometry as a Cyber Security Tool. 88-97 - Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Ievgeniia Kuzminykh, Amal Mersni:

Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning. 98-107 - Roman Bybyk, Ivan R. Opirskyy, Mike McIntosh:

SDR Receivers as a New Challenge to Cybersecurity Wireless Technology. 108-119 - Alexandr Kuznetsov, Yaroslav Derevianko, Nikolay Poluyanenko, Oleksandr Bagmut:

Particle Swarm Optimization based on S-Boxes Generation. 120-134 - Denis Berestov, Oleg Kurchenko, Yuri Shcheblanin, Volodymyr Mishchenko, Nataliia Mazur:

Synthesis of the System of Iterative Dynamic Risk Assessment of Information Security. 135-148 - Sergiy Gnatyuk, Rat Berdibayev, Andriy Fesenko, Olha Kyryliuk, Anatoly Bessalov:

Modern SIEM Analysis and Critical Requirements Definition in the Context of Information Warfare. 149-166 - Serhii Buchyk, Nataliia Lukova-Chuiko, Serhii Toliupa, Vitalii Piatyhor, Oleksandr Buchyk:

Diceware Password Generation Algorithm Modification based on Pseudo-Random Sequences. 167-176 - Victor Krasnobayev, Alexander Kuznetsov, Mykhaylo Bagmut, Ludmila Gorbacheva, Tetiana Kuznetsova:

Method of Tabular Implementation for Diagnostics of Non-Positional Code Structures in the System of Residual Classes. 177-186 - Mariia Nazarkevych, Volodymyr V. Hrytsyk, Anzhela Kuza, Oleksii Shevchuk, Maryna Kostiak:

The Impact of the Covid-19 Pandemic on Students Studying in High Education Institutions. 187-196 - Viktor Grechaninov, Hennadii Hulak, Evgen Hulak, Pavlo Skladannyi, Volodymyr Sokolov:

Decentralized Access Demarcation System Construction in Situational Center Network. 197-206 - Kateryna Kraus, Nataliia Kraus:

Practice of Application of Latest Digital Technologies (short paper). 207-213 - Eleonora Tereshchenko, Olga Sosnovska, Natalya Ushenko, Viktoriya Andryeyeva, Mariia Kovalova:

Risk Assessment Information System of Enterprise Business Processes (short paper). 214-220 - Anatolii Sunduk, Yuliia Zhukova, Pavlo Shvets, Valeriia Loiko:

Economic Security Parameters in the Conditions of Increasing Information Risks and Threats (short paper). 221-228 - Sviatoslav Vasylyshyn, Ivan R. Opirskyy, Svitlana Shevchenko:

Honeypot Security Efficiency versus Deception Solution (short paper). 229-236 - Larysa Hatsenko, Sergey Herasimov, Serhii Pohasii:

Investigation of the Effect of Harmonic Interference on the Error with Frequency Conversion of Energy Supply Systems on Water Transport Vehicles (short paper). 237-243 - Tetiana Moiseienko, Anastasiia Kiva:

Cybersecurity Startup Investments (short paper). 244-250 - Vasyl Ustimenko, Oleksandr Pustovit:

Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper). 251-256 - Zoreslava Brzhevska, Roman Kyrychok, Andrii Anosov, Pavlo Skladannyi, Maksym Vorokhob:

Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact (short paper). 257-264 - Larysa Kriuchkova, Maksym Vovk, Ivan Tsmokanych, Denys Tarasenko:

Parameters of Aiming Interfering Signals for Information Protection from Leaks by High-Frequency Channel Imposition (short paper). 265-272 - Vasyl Buhas, Ihor Ponomarenko, Vlriy Bugas, Andrii Ramskyi, Volodymyr Sokolov:

Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity (short paper). 273-281 - Pavlo Anakhov, Viktoriia V. Zhebka, Nataliia Korshun, Alina Tushych, Tymur Dovzhenko:

Stability Method of Connectivity Automated Calculation for Heterogeneous Telecommunication Network (short paper). 282-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














