


default search action
CPITS II 2023: Virtual Event / Kyiv, Ukraine
- Volodymyr Sokolov, Tamara Radivilova, Vasyl Ustimenko, Mariya Nazarkevych:

Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), Kyiv, Ukraine, October 26, 2023 (online). CEUR Workshop Proceedings 3550, CEUR-WS.org 2023 - Denis Berestov, Oleg Kurchenko, Lyudmyla Zubyk, Serhii Kulibaba, Nataliia Mazur:

Assessment of Weather Risks for Agriculture using Big Data and Industrial Internet of Things Technologies. 1-13 - Bohdan Leshchenko, Tetiana A. Vakaliuk, Andrii Yefimenko, Viacheslav Osadchyi, Dmytro Antoniuk:

Model of a Subsystem for Securing E-Mail Against Loss using Mail Transport Agents based on Containerized Environments. 14-28 - Olha Mykhaylova, Taras Fedynyshyn, Anastasiia Datsiuk, Bohdan Fihol, Hennadii Hulak:

Mobile Application as a Critical Infrastructure Cyberattack Surface. 29-43 - Oleksandr Kuznetsov, Emanuele Frontoni, Viktor Katrich, Olena Kobylianska, Svetlana Pshenichnaya:

A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management. 44-54 - Oleksandr Vakhula, Ivan R. Opirskyy, Olha Mykhaylova:

Research on Security Challenges in Cloud Environments and Solutions based on the "Security-as-Code" Approach. 55-69 - Kateryna Kolbasova, Bohdan Zhurakovskyi, Vadym Poltorak, Volodymyr Nakonechnyi, Roman Kyrychok:

Smart Home Network based on Cisco Equipment. 70-80 - Oleksandr Kuznetsov, Oleksandr Peliukh, Nikolay Poluyanenko, Serhii Bohucharskyi, Ievgeniia Kolovanova:

Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems. 81-94 - Danyil Zhuravchak, Anastasiia Tolkachova, Andrian Piskozub, Valerii Dudvkevych, Nataliia Korshun:

Monitoring Ransomware with Berkeley Packet Filter. 95-106 - Vasyl Ustimenko, Oleksandr Pustovit:

Families of Stream Ciphers based on Non-Bijective Multivariate Encryption Maps of High Degree. 107-120 - Vadym Poltorak, Bohdan Zhurakovskyi, Volodymyr Saiko, Tamara Loktikova, Olena Nesterova:

Remote Object Confidential Control Technology based on Elliptic Cryptography. 121-130 - Serhii Toliupa, Anatolii Shevchenko, Serhii Buchyk, Ihor Pampukha, Andrii Kulko:

Managing the Security of the Critical Infrastructure Information Network. 131-142 - Vasyl Poberezhnyk, Valeriia Balatska, Ivan R. Opirskyy:

Development of the Learning Management System Concept based on Blockchain Technology. 143-156 - Maksim Iavich, Tamari Kuchukhidze, Tetiana Okhrimenko:

Verkle Tree-based Post-Quantum Digital Signature Scheme using Stateless Updatable Vector Commitment. 157-166 - Sergiy Gnatyuk, Dauriya Zhaksigulova, Oksana Zhyharevych, Dinara Ospanova, Iryna Chuba:

Studies on WSN Models for IoT-based Monitoring Systems in the Critical Infrastructure of the State. 167-180 - Stanislav Yarotskiy, Viktoriia Sydorenko, Anzhela Lelechenko, Olena Kolisnyk, Artem Polozhentsev:

Method of Determining the Importance Factor of IT Security Projects Investment Attractiveness in Critical Infrastructures. 181-190 - Volodymyr V. Hrytsyk, Olexii Babii, Mariia Nazarkevych, Vitaliy Chubaievsyi, Volodymyr Astapenya:

Prospects and Applications of Quantum Technologies (short paper). 191-199 - Volodymyr Malyukov, Valery Lakhno, Bohdan Bebeshko, Inna Malyukova, Mereke Zhumadilova:

Multifactor Model of the Digital Cryptocurrency Market as a Computational Core of the Information System (short paper). 200-208 - Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Serhii Smirnov:

Modeling Attacks on the DHCP Protocol in the GNS3 Environment and Determining Methods of Security Against Them (short paper). 209-216 - Denys Shevchuk, Oleh Harasymchuk, Andrii Partyka, Nataliia Korshun:

Designing Secured Services for Authentication, Authorization, and Accounting of Users (short paper). 217-225 - Anna Ilyenko, Sergii Ilyenko, Olena Prokopenko, Hennadii Hulak, Iryna Melnyk:

Practical Aspects of Using Fully Homomorphic Encryption Systems to Protect Cloud Computing (short paper). 226-233 - Serhii Abramov, Anatoly Bessalov, Volodymyr Sokolov:

Properties of Isogeny Graph of Non-Cyclic Edwards Curves (short paper). 234-239 - Pavlo Anakhov, Viktoriia V. Zhebka, Svitlana Popereshnyak, Pavlo Skladannyi, Volodymyr Sokolov:

Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper). 240-245 - Sergii Kavun, Ruslana Levkina, Yana Kotko, Dmytro Levkin, Artur Levkin:

Information Security in Project Management for the Financial and Budgetary Capacity of the National Economy (short paper). 246-254 - Sergii Kavun, Dmytro Levkin, Artur Levkin, Yana Kotko, Ruslana Levkina:

Methods of Mathematical Programming for Designing a Safe Environment for Bioobject (short paper). 255-260 - Larysa Kriuchkova, Ivan Tsmokanych, Svitlana Shevchenko, Oleksandr Bohdanov, Nataliia Mazur:

Experimental Research of the Parameters of Danger and Protective Signals Attached to High-Frequency Imposition (short paper). 261-268 - Pavlo Anakhov, Viktoriia V. Zhebka, Vladislav Kravchenko, Pavlo Skladannyi, Oleksii Zhyltsov:

Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir (short paper). 269-274 - Nadiia Dovzhenko, Oleg Barabash, Nataliia Ausheva, Yevhen Ivanichenko, Sergiy Obushnyi:

Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing (short paper). 275-280 - Yurii Myshkovskyi, Mariia Nazarkevych:

Robustness of Fingerprint Liveness Detection based on Convolutional Neural Networks (short paper). 281-288 - Anatoly Shcherba, Emil Faure, Artem Skutskyi, Oleksandr Kharin:

Families of Square Commutative 2х2 Matrices (short paper). 289-296 - Svitlana Shevchenko, Yuliia Zhdanova, Halina Shevchenko, Olena Nehodenko, Svitlana Spasiteleva:

Information Security Risk Management using Cognitive Modeling (short paper). 297-305 - Emil Faure, Anatoly Shcherba, Artem Skutskyi, Artem Lavdanskyi:

A Finite Field of Square Matrices of Order 2 (short paper). 306-312 - Giorgi Akhalaia, Maksim Iavich, Giorgi Iashvili, Dmytro Prysiazhnyy, Tetiana Smirnova:

Secure Encrypted Connection on Georgian Website (short paper). 313-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














