


default search action
ISecIT 2021: Odessa, Ukraine
- Mikolaj P. Karpinski, Piotr Milczarski, Nadiia Kazakova, Serhii Toliupa, Svitlana Kuznichenko, Serhii Yevseiev, Oleksii Fraze-Frazenko, Artem Sokolov:

Proceedings of the 3rd International Conference on Information Security and Information Technologies (ISecIT 2021) co-located with 1st International Forum "Digital Reality" (DRForum 2021), Odessa, Ukraine, September 13-19, 2021. CEUR Workshop Proceedings 3200, CEUR-WS.org 2022 - Oleksandr Laptiev, Nataliia Lukova-Chuiko, Serhii Laptiev, Tetiana Laptieva, Vitaliy Savchenko, Serhii Yevseiev:

Development of a Method for Detecting Deviations in the Nature of Traffic from the Elements of the Communication Network. 1-9 - Viktor Avramenko, Mykyta Bondarenko:

Using the Sum of Real Type Functions to Encrypt Messages. 10-17 - Serhii Trystan, Olha Matiushchenko, Maryna Naumenko:

Method Of Recognition Sarcasm In English Communication With The Application Of Information Technologies. 18-23 - Vitalii Savchenko, Volodymyr Akhramovych, Oleksander Matsko, Ivan Havryliuk:

Method of Calculation of Information Protection from Clusterization Ratio in Social Networks. 24-31 - Olha Svynchuk, Andrii Barabash, Serhii Laptiev, Tetiana Laptieva:

Modification of Query Processing Methods in Distributed Databases Using Fractal Trees. 32-37 - Vitalii Savchenko, Valeriia Savchenko, Oleksandr Laptiev, Oleksander Matsko, Ivan Havryliuk, Kseniia Yerhidzei, Iryna Novikova:

Detection of Slow DDoS Attacks Based on Time Delay Forecasting. 38-46 - Vadym Tiutiunyk, Olha Tiutiunyk, Oleh Teslenko, Natalia Brynza:

Peculiar Properties of Creating a System of Support to Make Anti- Crisis Decisions by Experts of the Situational Center at the Cyber Protection Object. 47-56 - Oleksandr Tymochko, Maksim Pavlenko, Volodymyr Larin:

The Basic Principles of the Compact Video Frames Representation Technology, Which are Presented in a Differential Form in Computer Systems. 57-61 - Oleksiy A. Borysenko, Oleksii Y. Horiachev, Viktor V. Serdyuk, Andriy O. Horyshnyak, Oleksandr M. Kobyakov, Olga V. Berezhna:

Protection of Numerical Information Based on Permutations. 62-67 - Dmytro Ikaiev, Yaroslav Yaroshenko, Andrii Shalyhin, Volodymyr Nerubatskyi, Valerii Bondar, Volodymyr Herasymenko:

Methodical Approach to the Development of a Mathematical Model for Calculating the Combat Potentials of Strike Unmanned Aircraft. 68-73 - Oleksandr Voitko, Volodymyr Cherneha, Vladislav Solonnikov, Olena Poliakova, Roman Korolyov:

Determining the Required Number of Information Channels Based on the Information Dissemination Model. 74-79 - Vitaliy Lysenko, Valerii Koval, Igor Bolbot, Taras Lendiel, Kateryna Nakonechna, Anastasija Bolbot:

The Criterion of the Effective Use of Energy Resources While Producing Plant Products of Specified Quality. 80-85 - Mykola Brailovskyi, Serhii Toliupa:

Problems of Analysis and Forecasting of Information and Psychological Influences in Social Networks. 86-91 - Victor Strelbitskyi, Nataliia Punchenko, Oleksandra Tsyra:

Methods for Assessing the Risk of Approaching Ships as an Integral Part of the Vessel Traffic Control System. 92-96 - Mikolaj P. Karpinski, Bogdan Tomashevsky, Natalia Zahorodna, Serhii Yevseiev, Stanislaw Andrzej Rajba, Oleksandr Milov:

Model of the System for Special Purpose of Critical Infrastructure Objects. 97-106 - Mikolaj P. Karpinski, Alexander Shmatko, Serhii Yevseiev, Daniel Jancarczyk, Stanislav Milevskyi:

Detection Of Intrusion Attacks Using Neural Networks. 107-114 - Hassan Mohamed Muhi-Aldeen, Yurii Khlaponin, Ibtehal Shakir Mahmoud, Volodymyr Vyshniakov, Vadym Poltorak, Dmytro Khlaponin, Muwafaq Shyaa Alwan:

Technology of Secure Data Exchange in the IoT System. 115-121 - Oleksandr Milov, Serhii Yevseiev, Stanislav Milevskyi, Krzysztof Kajstura, Ruslana Ziubina:

Critical Points of Information Influence in Social Networks. 122-127 - Iryna Zamrii, Viktoriya Shkapa, Valentyn Sobchuk, Hanna Vlasyk:

Application Of Greedy Algorithms On Classes (ψ, β) - differentiable Periodic Functions In Lebesgue Spaces For Optimization Problems. 128-134 - Serhii Yevseiev, Olha Korol, Olga Veselska, Serhii Pohasii, Vladyslav Khvostenko:

Evaluation of Cryptographic Strength and Energy Intensity of Design of Modified Crypto-Code Structure of McEliece with Modified Elliptic Codes. 135-148 - Oleksandr Blyskun, Volodymyr Herasymenko, Oleksii Martyniuk, Yurii Kolomiiets, Yevhen Honcharenko:

Determining the Level of Flight Crew Readiness Based on Fuzzy Logic Approaches. 149-157 - Iryna Ushakova, Yuri Skorin, Alexander V. Shcherbakov:

Methods of quality assurance of software development based on a systems approach. 158-168 - Oleksandr Lavrut, Tetiana Lavrut, Vladyslav Kolesnyk, Halyna Kolesnyk, Serhii Bohutskyi, Leonid Polishchuk:

Cyber Defense Is A Modern Component Of Ukraine's Security. 169-174 - Roman Litvinchuk, Andrii Levchenko:

Audit Of Mathematical Models For Software Specification Of The Workplace Decision Support System At The Logistics Management Point. 175-182 - Ivan I. Bobok, Alla Kobozieva, Nataliya Kushnirenko:

Use of the Normalized Gap of Maximum Singular Value of the Image Block to Evaluate the Capacity of the Steganographic Channel. 183-188 - Volodymyr Fedorchenko, Igor Prasol, Olha Yeroshenko:

Information Technology for Identification of Electric Stimulating Effects Parameters. 189-195 - Kateryna Molodetska, Serhiy Veretiuk, Volodymyr Pilinsky:

Identifying the Transition of Interactions in Virtual Communities of Social Networking Services to Chaotic Dynamics. 196-203 - Oleksandr Milov, Yevgen Melenti, Stanislav Milevskyi, Serhii Pohasii, Serhii Yevseiev:

Cyber Terrorism as an Object of Modeling. 204-210 - Nadiia Bielikova, Daniil Shmatkov:

Methodology For Environmental Monitoring With Use of Methods of Mathematical Modeling. 211-217 - Olha Hryshchuk:

Spectral Model of the Encryption Key for a Symmetric Cryptosystem Based on Differential Transformations. 218-222 - Ruslan Hryshchuk:

Example of Differential Transformations Application in Cybersecurity. 223-227 - Vadym Poddubnyi, Roman Gvozdev, Oleksandr Sievierinov, Oleksandr Fediushyn:

Possibilities of Using Watermarks to Protect Software Code. 228-233 - Shmatko Olexandr, Serhii Yevseiev, Vladyslav Khvostenko:

Simulation model of Blockchain System in the Higher Education. 234-238 - Aynur Jamal Jabiyeva:

Errors in the Hardware of the Device Used to Measure the Average Voltage of Infrared Frequencies. 239-243 - Yuriy Bobalo, Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk:

Paradigm of Safe Intelligent Ecological Monitoring of Environmental Parameters. 244-249 - Kateryna Tokarieva, Nataliya Vnukova, Volodymyr Aleksiyev:

Legal Aspects of Blockchain Technology Regulation in the Financial Sphere. 250-254 - Olha Petrenko, Oleksii Petrenko:

Improving the Stability of Cryptographic Algorithms on Algebraic Lattices. 255-259 - Anastasiya Molchanova, Svitlana Kuznichenko, Iryna Buchynska:

A Mobile Augmented Reality Application for Museum Exhibitions. 260-264 - Yurii Shcherbyna, Nadiia Kazakova, Oleksii Fraze-Frazenko:

The Mersenne Twister Output Stream Postprocessing. 265-273 - Anatolii Davydenko, Oleksandr Korchenko, Olena Vysotska, Ihor Ivanchenko:

Model and Method for Identification of Functional Security Profile. 274-280 - Iryna Otenko, Marharyta Podorozhna, Vasyl Otenko:

Information Support for Making Strategic Decisions on the Development of an Industrial Enterprise. 281-285 - Mykyta Dermenzhi, Svitlana Kuznichenko, Tetiana Tereshchenko, Iryna Buchynska, Viktoriia Klepatska:

Development of an Automated Passenger Transport Management System Using Microservices Architecture. 286-294 - Oleksandr Korchenko, Svitlana Kazmirchuk, Tetiana Panivko-Babenko, Stanislav Milevskyi, Volodymyr Aleksiyev:

Real-Time Cybersecurity Risk Assessment. 295-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














