


default search action
CSDP 2025: Lviv, Ukraine
- Ivan R. Opirskyy, Mikolaj P. Karpinski, Orest Kochan, Axel Sikora, Taras Maksymyuk, Michal Podpora, Sergiy Gnatyuk, Biju Issac:

Proceedings of the Cyber Security and Data Protection, CSDP 2025, Lviv, Ukraine, July 31, 2025. CEUR Workshop Proceedings 4042, CEUR-WS.org 2025 - Tetiana Korobeinikova, Nazar Kravchuk:

ML-trained model and method for blocking dangerous queries. 1-16 - Pavlo Skladannyi, Yuliya Kostyuk, Karyna Khorolska, Bohdan Bebeshko, Volodymyr Sokolov:

Model and methodology for the formation of adaptive security profiles for the protection of wireless networks in the face of dynamic cyber threats. 17-36 - Yuliya Kostyuk, Svitlana Rzaieva, Karyna Khorolska, Nataliia Mazur, Nataliia Korshun:

Architecture of the software system of confidential access to information resources of computer networks. 37-53 - Leila Rzayeva, Abilkair Imanberdi, Yerassyl Yermekov:

A comparison of programming languages' applicability for encrypted data analysis. 54-63 - Volodymyr Rudnytskyi, Vira Babenko, Nataliia Lada, Tetiana Stabetska, Dmytro Pidlasyi, Liubomyr Parkhuts:

Modeling of a cryptographic network based on application of CET-operations. 64-79 - Yurii Klots, Vira Titova, Nataliia Petliak, Dmytro Tymoshchuk, Nataliya Zagorodna:

Intelligent data monitoring anomaly detection system based on statistical and machine learning approaches. 80-89 - Yaroslav Tarasenko, Oleh Chervotoka, Serhii Orlov, Nataliia Lada, Volodymyr Shapoval, Andrian Piskozub:

A model of a secure information system for cognitive data processing in IoT sensor networks for laboratory climatic testing. 90-104 - Inna Rozlomii, Emil Faure, Andrii Yarmilko, Serhii Naumenko:

The method for verifying firmware integrity in IoT devices for secure boot using lightweight hash functions. 105-116 - Olena Kryvoruchko, Yaroslav Shestak, Elizaveta Zavhorodnya, Andriy Fesenko:

Higher education cyber resilience: Intelligent protection of educational, administrative and resource systems. 117-131 - Oleksandr Termenzhy, Alla Kozhevnikova, Vitalii Susukailo:

Preparing pre-service teachers for the digital era: Cyberethics, cybersafety, and cybersecurity skills as a core AI competency. 132-141 - Petro Venhersky, Orest Onyshchenko, Yaryna Kokovska, Oleksandr Korchenko:

Development of cyberthreat-resistant flood prediction systems using multi-sensor data verification. 142-152 - Volodymyr Akhramovych, Vadym Akhramovych, Anna Ilyenko, Liliia Halata, Tetiana Okhrimenko, Olesia Yakovenko, Yevheniia Halych:

The methodology for researching the cybersecurity of social platforms in relation to the number of communities. 153-166 - Victor Sineglazov, Oleksii Shcherban:

Intelligent system for hyperspectral image processing based on generative adversarial networks. 167-179 - Sergiy Gnatyuk, Zarina Poberezhna, Maksym Zaliskyi:

Information security and protection from cyber attacks as a component of the economic security system of the enterprise. 180-192 - Viktor Gnatyuk, Roman Hamretskyi:

A domain-oriented method for evaluating 5G core network software quality. 193-202 - Maksym Bilychenko, Nataliia Kasianova, Serhii Smerichevskyi, Oleksandr Lavrynenko, Igor Kryvovyazyuk:

Development of a smart personnel security system using machine learning. 203-215 - Vasyl Yatskiv, Mykhailo Kasianchuk, Ludmila Babala, Serhii Kulyna:

Digital forensics and cyber threat management during wartime: Analysis of new legislative initiatives. 216-225 - Oksana Sapsai, Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk:

Research on automated security incident management in public cloud environments. 226-249 - Vladyslav Chornii, Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk:

Information security risks associated with the uncontrolled storage of secrets in source code. 250-271 - Yurii Zhuravchak, Danyil Zhuravchak, Anastasiia Zhuravchak, Ivan R. Opirskyy:

Security regression visualization in CI/CD using trivy and GitHub actions. 272-281 - Bakhytzhan Akhmetov, Valerii Lakhno, Nurzhamal Oshanova, Gulistan Yelubay:

Optimization of virtual machine placement in a university cloud considering information security requirements (short paper). 282-290 - Andrii Sahun, Yevheniy Nikitenko, Pavlo Gikalo, Olena Panasko, Valerii Dudykevych:

Method of quick hash functions quality determination (short paper). 291-299 - Valeriy Lakhno, Sergiy Mamchenko, Alona Desiatko, Bohdan Bebeshko, Ihor Mirko:

Hybrid method for detecting cyber threats in the network traffic (short paper). 300-307 - Mikolaj P. Karpinski, leksandr Revniuk, Dmytro Tymoshchuk, Ruslan Kozak, Aizhan Tokkuliyeva:

Fuzzy logic system as a component of the web application security information system (short paper). 308-315 - Maryna Derkach, Danylo Matiuk, Inna Skarga-Bandurova, Nataliya Zagorodna:

CrypticWave: A zero-persistence ephemeral messaging system with client-side encryption (short paper). 316-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














