default search action
21st ITS 2021: Kyiv, Ukraine
- Aleksandr Dodonov, Dmitry Lande, Nikolai Stoianov, Vitaliy V. Tsyganok, Sándor Bozóki, Stan Lipovetsky, Andrei A. Snarskii, Andriy Olenko, Oleg Chertov:
Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS 2021), Kyiv, Ukraine, December 9, 2021. CEUR Workshop Proceedings 3241, CEUR-WS.org 2022 - Oleksandr Dodonov, Olena Gorbachyk, Maryna Kuznietsova:
Automated Organizational Management Systems of Critical Infrastructure: Security and Functional Stability. 1-12 - Andrei Snarskii, Dmytro Lande, Oleh O. Dmytrenko:
Relaxation Time as Unique Characteristic for Networks Clustering. 13-22 - Oleksii Novikov, Georgy Vedmedenko, Iryna Stopochkina, Mykola Ilin:
Cyber Attacks Cascading Effects Simulation for Ukraine Power Grid. 23-35 - Taras Rudnyk, Oleg Chertov:
Determining Reasons of Political Rating Changes Based on Twitter Data. 36-45 - Sergii V. Kadenko, Vitaliy V. Tsyganok, Zsombor Szádoczki, Sándor Bozóki, Patrik Juhász, Oleh V. Andriichuk:
Improvement of Pair-wise Comparison Methods Based on Graph Theory Concepts. 46-55 - Nataliia Kuznietsova, Petro Bidyuk, Maryna Kuznietsova, Jules Lepretre:
Machine Learning Techniques for Fault-tolerance Analysis and Forecasting. 56-68 - Mykhailo V. Kolomytsev, Nataliia Kussul, Svitlana O. Nosok:
Data Protection on Business Intelligence Analytics Platform with Masking Level Adjustment. 69-78 - Hryhorii Hnatiienko, Vitaliy Snytyuk, Nataliia Tmienova:
Calculation of the Integral Quality Index of a Scientific Event in the Context of the Interests of a Scientific Institution. 79-91 - Ihor Subach, Vitalii Fesokha, Artem Mykytiuk, Volodymyr Kubrak, Stanislav Korotayev:
Simulation Model of a Fuzzy Cyber Attack Detection System. 92-101 - Anatoly Y. Gladun, Katerina Khala, Rodrigo Martínez-Béjar:
Development of Object's Structured Information Field with Specific Properties for its Semantic Model Building. 102-111 - Dmytro Kucherov, Andriy Fesenko, Igor V. Ogirko, Olha I. Ogirk, Andrei Berezkin:
Information Security of Printing Organizations. 112-122 - Oleksandr V. Koval, Valeriy O. Kuzminykh, Iryna I. Husyeva, Beibei Xu, Shiwei Zhu:
Improving the Efficiency of Typical Scenarios of Analytical Activities. 123-132 - Aleksandr Matov:
Fog Computing Architecture and their Analytical Models in Solving Problem Flows taking into account Failures and Features of Functioning. 133-146 - Mykhailo Klymash, Liubov Berkman, Serhiy Otrokh, Volodymyr Pilinsky, Oleksandr Chumak, Olena Hryshchenko:
Increasing the Multi-position Signals Noise Immunity of Mobile Communication Systems Based on High-order Phase Modulation. 147-157 - Vitaliy V. Tsyganok, Oleksandr Hryhorenko, Viktor Holota, Maksym Konovaliuk, Olha Tsyhanok:
An Approach to Security Environment Forecasting Based on Structuring of Foresight Process and on the Method of Goal Dynamic Evaluation of Alternatives. 158-168 - Hryhorii Hnatiienko, Nikolay A. Kiktev, Tatiana Babenko, Alona Desiatko, Larysa Myrutenko:
Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data. 169-180 - Nataliia Kuznietsova, Rémi Amoroso:
An Approach to Green Financial Credit Risks Modeling. 181-192 - Vadym E. Mukhin, Valerii Zavgorodnii, Yaroslav Kornaga, Lesia Baranovska:
Algorithm for the Information Space Forming and the Evaluation of Input Objects Search Efficiency. 193-204 - Artem Soboliev, Dmytro Lande:
Distributed System of Intelligent Content Monitoring Agents. 205-214 - Volodymyr Yuzefovych, Yevheniia Tsybulska, Oleh V. Andriichuk:
One Approach to Formation of Common Information Space Information Resource in Organizational Management Systems. 215-224 - Leonid Galchynsky, Mykola Graivoronskyi, Oleh O. Dmytrenko:
Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT. 225-236 - Julia V. Rogushina, Anatoly Y. Gladun:
Mereological Approach for Formation of "Part-Whole" Relations between Pages of a Semantic Wiki-resource. 237-247 - Serhii Toliupa, Liubov Berkman, Serhiy Otrokh, Bohdan Zhurakovskyi, Valeriy Kuzminykh, Hanna Dudarieva:
Formation of Shift Index Vectors of Ring Codes for Information Transmission Security. 248-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.