


default search action
CSDP 2024: Lviv, Ukraine
- Taras Maksymyuk, Orest Kochan, Mikolaj P. Karpinski, Axel Sikora, Michal Podpora, Sergiy Gnatyuk:

Proceedings of the Cyber Security and Data Protection, CSDP 2024, Lviv, Ukraine, June 30, 2024. CEUR Workshop Proceedings 3800, CEUR-WS.org 2024 - Yurii Dreis, Oleksandr Korchenko, Volodymyr Sokolov, Pavlo Skladannyi:

Model to formation data base of secondary parameters for assessing status of the state secret protection. 1-11 - Denys Khanin, Viktor Otenko, Volodymyr Khoma:

Research on the effectiveness of concatenated embeddings in facial verification. 12-21 - Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Elena Nyemkova, Mikolaj P. Karpinski:

Shadow IT risk analysis in public cloud infrastructure. 22-31 - Andrii Nyzhnyk, Andrii Partyka, Michal Podpora:

Increase the cybersecurity of SCADA and IIoT devices with secure memory management. 32-41 - Dmytro Proskurin, Maksim Iavich, Tetiana Okhrimenko, Okoro Chukwukaelonma, Tetiana Hryniuk:

Predicting pseudo-random number generator output with sequential analysis. 42-57 - Oleksandr Vakhula, Ivan R. Opirskyy:

Research on security as code approach for cloud-native applications based on Kubernetes cluster. 58-69 - Valeriia Balatska, Vasyl Poberezhnyk, Ivan R. Opirskyy:

Utilizing blockchain technologies for ensuring the confidentiality and security of personal data in compliance with GDPR. 70-80 - Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Andrii Paziuk, Artem Polozhentsev:

Experimental study of the model for calculating the quantitative criteria for assessing the security level of information and communication systems of the state critical infrastructure (short paper). 81-89 - Azamat Imanbayev, Ansar Jakupov, Yersultan Valikhan, Roman Odarchenko:

Designing an effective network-based intrusion-detecting system for 5G networks (short paper). 90-96 - Roman Syrotynskyi, Ivan Tyshyk, Orest Kochan, Volodymyr Sokolov, Pavlo Skladannyi:

Methodology of network infrastructure analysis as part of migration to zero-trust architecture (short paper). 97-105 - Berik Akhmetov, Sergiy Gnatyuk, Bakhytzhan Akhmetov, Bauyrzhan Tynymbayev:

Analysis of modern LMS platforms in Kazakhstan: Structure, functionality, cybersecurity (short paper). 106-113 - Tetiana Korobeinikova, Ihor Zhuravel, Lesya Mychuda, Axel Sikora:

The practice of block symmetric encryption for a secure Internet connection (short paper). 114-122 - Tea Tvalavadze, Ia Ghadua, Giorgi Kalandadze, Maksim Iavich:

Signature-based manual dating vs. neural network automation (short paper). 123-130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














