default search action
CPITS I 2021: Kyiv, Ukraine
- Volodymyr Buriachok, Dmytro Ageyev, Valeriy Lahno, Volodymyr Sokolov:
Paper Proceedings of the Selected Papers on Publishing Papers with CEUR-WS co-located with Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2021), Kyiv, Ukraine, January 28, 2021 (online). CEUR Workshop Proceedings 2923, CEUR-WS.org 2021
Session 1. Cybersecurity and Cryptography
- Anatoly Bessalov, Volodymyr Sokolov, Pavlo Skladannyi, Oleksii Zhyltsov:
Computing of Odd Degree Isogenies on Supersingular Twisted Edwards Curves. 1-11 - Ihor Samoilenko, Anatolii Nikitin, Ganna Verowkina, Tetiana Nikitina:
Construction Features and Analysis of Warfare Information Model with Impulse Perturbations under Poisson Approximation Conditions (short paper). 12-17 - Vasyl Ustimenko, Oleksandr Pustovit:
New Cryptosystems of Noncommutative Cryptography based on Eulerian Semigroups of Multivariate Transformations (short paper). 18-26 - Vasyl Sheketa, Svitlana Chupakhina, Mariya Leshchenko, Larysa Tymchuk, Kostiantyn Chub:
Prospective Areas of Research in the Development of Post-Quantum Cryptography. 27-36 - Roman Boyarchuk, Mykola Khudyntsev, Oleksiy Lebid, Oleksandr Trofymchuk:
Organizational and Technical Model of National Cybersecurity and Cyber Protection. 37-46 - Yuri Bespalov, Alberto Garoffolo, Lyudmila Kovalchuk, Hanna Nelasa, Roman Oliynykov:
Game-Theoretic View on Decentralized Proof Generation in zk-SNARK-based Sidechains. 47-59 - Stanislav Milevskyi, Volodymyr Aleksiyev, Olha Korol, Oleksandr Milov, Serhii Yevseiev:
Security Analysis Models for Multimedia Information Resources in Social Networks (short paper). 60-67 - Sergiy Gnatyuk, Rat Berdibayev, Zhadyra Avkurova, Oleksii Verkhovets, Madina Bauyrzhan:
Studies on Cloud-based Cyber Incidents Detection and Identification in Critical Infrastructure. 68-80 - Oleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Anastasiia Shapovalova, Valentyn Lemeshko:
Network Security Approach based on Traffic Engineering Fast ReRoute with support of Traffic Policing. 81-90 - Vitalii Susukailo, Sviatoslav Vasylyshyn, Ivan Opirskyy, Volodymyr Buriachok, Olena Riabchun:
Cybercrimes Investigation via Honeypots in Cloud Environments (short paper). 91-96 - Victor Krasnobayev, Alexandr Kuznetsov, Anna Kononchenko, Tetiana Kuznetsova:
Method of Diagnostic of Non-Positional Code Structures in the System of Residue Classes Basing on the Usage of an Alternative Number Set Informativeness. 97-106 - Artem Sokolov, Nadiia Kazakova, Lydia Kuzmenko, Mariia Mahomedova:
Prerequisites for Developing a Methodology for Estimating and Increasing Cryptographic Strength based on Many-Valued Logic Functions. 107-116 - Sergii Buchyk, Sergey Tolyupa, Yaroslav Symonychenko, Anna Symonychenko, Artem Platonenko:
Improvement of Steganographic Methods based on the Analysis of Image Color Models (short paper). 117-124 - Dmytro Havrylov, Olexandr Shaigas, Oksana Stetsenko, Yurii Babenko, Valerii Yroshenko:
Application of Arithmetic Coding Methods in Cryptographic Information Protection Systems. 125-136 - Hennadii Hulak, Larysa Kriuchkova, Pavlo Skladannyi, Ivan Opirskyy:
Formation of Requirements for the Electronic Record-Book in Guaranteed Information Systems of Distance Learning (short paper). 137-142 - Vladimir Barannik, Serhii Sidchenko, Natalia Barannik, Dmitriy Barannik, Sergii Shulgin:
Methods for Decoding Informational Codes of Cryptocompression Codograms to Improve Information Security. 143-152
Session 2. Wireless Network Privacy
- Olexander Belej, Nataliia Bokla, Lubov alkiv:
Detection of Attacks in Wireless Networks of IoT. 153-163 - Razvan Bocu, Maksim Iavich, Sergiy Gnatyuk, Dinara Ospanova, Yuliia Sotnichenko:
Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices. 164-174 - Anna Shcherbak, Andrii Astrakhantsev, Oleg Shcherbak, Galyna Liashenko:
Biometric Templates Noise Immunity during Transmission by Mobile Networks (short paper). 175-181 - Volodymyr Barannik, Oleksandr Slobodyanyuk, Andrii Krasnorutsky, Anna Korchenko, Serhii Pchelnikov:
Aerial Photographs for Ensuring Cyber Security of Critical Infrastructure Objects. 182-191
Session 3. Machine Learning and Telecommunications in Cybersecurity
- Mykola Pasieka, Vasyl Sheketa, Iryna Halushchak, Svitlana Verbeshchuk, Mykhailo Yasinskyi:
Designing Networked High-Load Distributed Computing Web Systems for Intensive Processing of Information Data Flows. 192-205 - Victor Krasnobayev, Alexandr Kuznetsov, Victoria Popenko, Tetiana Kuznetsova:
Design of a Residual Adder in Computer Systems (short paper). 206-212 - Bohdan Bebeshko, Karyna Khorolska, Nataliia Kotenko, Oleksander Kharchenko, Tetyana Zhyrova:
Use of Neural Networks for Predicting Cyberattacks. 213-223 - Volodymyr Saiko, Serhii Toliupa, Volodymyr Nakonechnyi, Maxym Kotov, Volodymyr Astapenya:
Method of Determining the Angular Orientation of Small Satellites in Orbit. 224-233 - Mykola Kozlenko, Volodymyr Sendetskyi, Oleksiy Simkiv, Nazar Savchenko, Andy Bosyi:
Identity Documents Recognition and Detection using Semantic Segmentation with Convolutional Neural Network (short paper). 234-242 - Mariya Nazarkevych, Volodymyr V. Hrytsyk, Yaroslav Voznyi, Andrii Marchuk, Olha Vozna:
Method of Detecting Special Points on Biometric Images based on New Filtering Methods (short paper). 243-251 - Olena Iosifova, Ievgen Iosifov, Volodymyr Sokolov, Oleh Romanovskyi, Igor Sukaylo:
Analysis of Automatic Speech Recognition Methods (short paper). 252-257 - Nadia Pasieka, Myroslava Kulynych, Svitlana Chupakhina, Yulia Romanyshyn, Mykola Pasieka:
Harmful Effects of Fake Social Media Accounts and Learning Platforms. 258-271 - Zoreslava Brzhevska, Halyna Haidur, Nadiia Dovzhenko, Andrii Anosov, Maksym Vorokhob:
Recurrent Estimation of the Information State Vector and the Correlation of Measuring Impact Matrix using a Multi-Agent Model (short paper). 272-276 - Olha Shevchenko, Andrii Bondarchuk, Olha Polonevych, Bohdan Zhurakovskyi, Nataliia Korshun:
Methods of the Objects Identification and Recognition Research in the Networks with the IoT Concept Support (short paper). 277-282 - Dmytro Ageyev, Tamara Radivilova:
Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks. 283-288
Session 4. Risk Management and Economic Security
- Valeriy Lakhno, Andii Sahun, Vladyslav Khaidurov, Dmitro Kasatkin, Serhii Liubytskyi:
Model of Operation System's Incidents Forecasting (short paper). 289-294 - Yurii Khlaponin, Olha Izmailov, Nameer Hashim Qasim, Hanna Krasovska, Kateryna Krasovska:
Management Risks of Dependence on Key Employees: Identification of Personnel. 295-308 - Halyna Shevchenko, Svitlana Shevchenko, Yuliia Zhdanova, Svitlana Spasiteleva, Olena Negodenko:
Information Security Risk Analysis SWOT (short paper). 309-317 - Serhii Zybin, Volodymyr Khoroshko, Yuliia Khokhlachova, Valerii Kozachok:
Approach of the Attack Analysis to Reduce Omissions in the Risk Management. 318-328 - Denis Berestov, Oleg Kurchenko, Yuri Shcheblanin, Nataliia Korshun, Tetiana S. Opryshko:
Analysis of Features and Prospects of Application of Dynamic Iterative Assessment of Information Security Risks (short paper). 329-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.