default search action
ISecIT 2021: Odessa, Ukraine
- Mikolaj P. Karpinski, Piotr Milczarski, Nadiia Kazakova, Serhii Toliupa, Svitlana Kuznichenko, Serhii Yevseiev, Oleksii Fraze-Frazenko, Artem Sokolov:
Proceedings of the 3rd International Conference on Information Security and Information Technologies (ISecIT 2021) co-located with 1st International Forum "Digital Reality" (DRForum 2021), Odessa, Ukraine, September 13-19, 2021. CEUR Workshop Proceedings 3200, CEUR-WS.org 2022 - Oleksandr Laptiev, Nataliia Lukova-Chuiko, Serhii Laptiev, Tetiana Laptieva, Vitaliy Savchenko, Serhii Yevseiev:
Development of a Method for Detecting Deviations in the Nature of Traffic from the Elements of the Communication Network. 1-9 - Viktor Avramenko, Mykyta Bondarenko:
Using the Sum of Real Type Functions to Encrypt Messages. 10-17 - Serhii Trystan, Olha Matiushchenko, Maryna Naumenko:
Method Of Recognition Sarcasm In English Communication With The Application Of Information Technologies. 18-23 - Vitalii Savchenko, Volodymyr Akhramovych, Oleksander Matsko, Ivan Havryliuk:
Method of Calculation of Information Protection from Clusterization Ratio in Social Networks. 24-31 - Olha Svynchuk, Andrii Barabash, Serhii Laptiev, Tetiana Laptieva:
Modification of Query Processing Methods in Distributed Databases Using Fractal Trees. 32-37 - Vitalii Savchenko, Valeriia Savchenko, Oleksandr Laptiev, Oleksander Matsko, Ivan Havryliuk, Kseniia Yerhidzei, Iryna Novikova:
Detection of Slow DDoS Attacks Based on Time Delay Forecasting. 38-46 - Vadym Tiutiunyk, Olha Tiutiunyk, Oleh Teslenko, Natalia Brynza:
Peculiar Properties of Creating a System of Support to Make Anti- Crisis Decisions by Experts of the Situational Center at the Cyber Protection Object. 47-56 - Oleksandr Tymochko, Maksim Pavlenko, Volodymyr Larin:
The Basic Principles of the Compact Video Frames Representation Technology, Which are Presented in a Differential Form in Computer Systems. 57-61 - Oleksiy A. Borysenko, Oleksii Y. Horiachev, Viktor V. Serdyuk, Andriy O. Horyshnyak, Oleksandr M. Kobyakov, Olga V. Berezhna:
Protection of Numerical Information Based on Permutations. 62-67 - Dmytro Ikaiev, Yaroslav Yaroshenko, Andrii Shalyhin, Volodymyr Nerubatskyi, Valerii Bondar, Volodymyr Herasymenko:
Methodical Approach to the Development of a Mathematical Model for Calculating the Combat Potentials of Strike Unmanned Aircraft. 68-73 - Oleksandr Voitko, Volodymyr Cherneha, Vladislav Solonnikov, Olena Poliakova, Roman Korolyov:
Determining the Required Number of Information Channels Based on the Information Dissemination Model. 74-79 - Vitaliy Lysenko, Valerii Koval, Igor Bolbot, Taras Lendiel, Kateryna Nakonechna, Anastasija Bolbot:
The Criterion of the Effective Use of Energy Resources While Producing Plant Products of Specified Quality. 80-85 - Mykola Brailovskyi, Serhii Toliupa:
Problems of Analysis and Forecasting of Information and Psychological Influences in Social Networks. 86-91 - Victor Strelbitskyi, Nataliia Punchenko, Oleksandra Tsyra:
Methods for Assessing the Risk of Approaching Ships as an Integral Part of the Vessel Traffic Control System. 92-96 - Mikolaj P. Karpinski, Bogdan Tomashevsky, Natalia Zahorodna, Serhii Yevseiev, Stanislaw Andrzej Rajba, Oleksandr Milov:
Model of the System for Special Purpose of Critical Infrastructure Objects. 97-106 - Mikolaj P. Karpinski, Alexander Shmatko, Serhii Yevseiev, Daniel Jancarczyk, Stanislav Milevskyi:
Detection Of Intrusion Attacks Using Neural Networks. 107-114 - Hassan Mohamed Muhi-Aldeen, Yurii Khlaponin, Ibtehal Shakir Mahmoud, Volodymyr Vyshniakov, Vadym Poltorak, Dmytro Khlaponin, Muwafaq Shyaa Alwan:
Technology of Secure Data Exchange in the IoT System. 115-121 - Oleksandr Milov, Serhii Yevseiev, Stanislav Milevskyi, Krzysztof Kajstura, Ruslana Ziubina:
Critical Points of Information Influence in Social Networks. 122-127 - Iryna Zamrii, Viktoriya Shkapa, Valentyn Sobchuk, Hanna Vlasyk:
Application Of Greedy Algorithms On Classes (ψ, β) - differentiable Periodic Functions In Lebesgue Spaces For Optimization Problems. 128-134 - Serhii Yevseiev, Olha Korol, Olga Veselska, Serhii Pohasii, Vladyslav Khvostenko:
Evaluation of Cryptographic Strength and Energy Intensity of Design of Modified Crypto-Code Structure of McEliece with Modified Elliptic Codes. 135-148 - Oleksandr Blyskun, Volodymyr Herasymenko, Oleksii Martyniuk, Yurii Kolomiiets, Yevhen Honcharenko:
Determining the Level of Flight Crew Readiness Based on Fuzzy Logic Approaches. 149-157 - Iryna Ushakova, Yuri Skorin, Alexander V. Shcherbakov:
Methods of quality assurance of software development based on a systems approach. 158-168 - Oleksandr Lavrut, Tetiana Lavrut, Vladyslav Kolesnyk, Halyna Kolesnyk, Serhii Bohutskyi, Leonid Polishchuk:
Cyber Defense Is A Modern Component Of Ukraine's Security. 169-174 - Roman Litvinchuk, Andrii Levchenko:
Audit Of Mathematical Models For Software Specification Of The Workplace Decision Support System At The Logistics Management Point. 175-182 - Ivan Bobok, Alla Kobozieva, Nataliya Kushnirenko:
Use of the Normalized Gap of Maximum Singular Value of the Image Block to Evaluate the Capacity of the Steganographic Channel. 183-188 - Volodymyr Fedorchenko, Igor Prasol, Olha Yeroshenko:
Information Technology for Identification of Electric Stimulating Effects Parameters. 189-195 - Kateryna Molodetska, Serhiy Veretiuk, Volodymyr Pilinsky:
Identifying the Transition of Interactions in Virtual Communities of Social Networking Services to Chaotic Dynamics. 196-203 - Oleksandr Milov, Yevgen Melenti, Stanislav Milevskyi, Serhii Pohasii, Serhii Yevseiev:
Cyber Terrorism as an Object of Modeling. 204-210 - Nadiia Bielikova, Daniil Shmatkov:
Methodology For Environmental Monitoring With Use of Methods of Mathematical Modeling. 211-217 - Olha Hryshchuk:
Spectral Model of the Encryption Key for a Symmetric Cryptosystem Based on Differential Transformations. 218-222 - Ruslan Hryshchuk:
Example of Differential Transformations Application in Cybersecurity. 223-227 - Vadym Poddubnyi, Roman Gvozdev, Oleksandr Sievierinov, Oleksandr Fediushyn:
Possibilities of Using Watermarks to Protect Software Code. 228-233 - Shmatko Olexandr, Serhii Yevseiev, Vladyslav Khvostenko:
Simulation model of Blockchain System in the Higher Education. 234-238 - Aynur Jamal Jabiyeva:
Errors in the Hardware of the Device Used to Measure the Average Voltage of Infrared Frequencies. 239-243 - Yuriy Bobalo, Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk:
Paradigm of Safe Intelligent Ecological Monitoring of Environmental Parameters. 244-249 - Kateryna Tokarieva, Nataliya Vnukova, Volodymyr Aleksiyev:
Legal Aspects of Blockchain Technology Regulation in the Financial Sphere. 250-254 - Olha Petrenko, Oleksii Petrenko:
Improving the Stability of Cryptographic Algorithms on Algebraic Lattices. 255-259 - Anastasiya Molchanova, Svitlana Kuznichenko, Iryna Buchynska:
A Mobile Augmented Reality Application for Museum Exhibitions. 260-264 - Yurii Shcherbyna, Nadiia Kazakova, Oleksii Fraze-Frazenko:
The Mersenne Twister Output Stream Postprocessing. 265-273 - Anatolii Davydenko, Oleksandr Korchenko, Olena Vysotska, Ihor Ivanchenko:
Model and Method for Identification of Functional Security Profile. 274-280 - Iryna Otenko, Marharyta Podorozhna, Vasyl Otenko:
Information Support for Making Strategic Decisions on the Development of an Industrial Enterprise. 281-285 - Mykyta Dermenzhi, Svitlana Kuznichenko, Tetiana Tereshchenko, Iryna Buchynska, Viktoriia Klepatska:
Development of an Automated Passenger Transport Management System Using Microservices Architecture. 286-294 - Oleksandr Korchenko, Svitlana Kazmirchuk, Tetiana Panivko-Babenko, Stanislav Milevskyi, Volodymyr Aleksiyev:
Real-Time Cybersecurity Risk Assessment. 295-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.