CEUR-WS.org/Vol-3241 - Information Technologies and Security 2022
Vol-3241
urn:nbn:de:0074-3241-0
Copyright © 2021 for
the individual papers by the papers' authors.
Copyright ©
2021
for the volume
as a collection by its editors.
This volume and its papers are published under the
Creative Commons License Attribution 4.0 International
CC BY 4.0
ITS 2021
Information Technologies and Security
Selected Papers of the XXI International Scientific and Practical Conference "Information Technologies and Security" (ITS 2021)
Kyiv, Ukraine, December 9, 2021
Program Committee
Aleksandr Dodonov
Dmitry Lande
Nikolai Stoianov
**
Vitaliy Tsyganok
Sándor Bozóki
***
Stan Lipovetsky
****
Andrei Snarskii
*****
Andriy Olenko
******
Oleg Chertov
*****
Institute for Information Recording of National Academy of Sciences of Ukraine
Kyiv, Ukraine
**
Bulgarian Defence Institute “Professor Tsvetan Lazarov”
Sofia, Bulgaria
***
Computer and Automation Research Institute Hungarian Academy of Sciences
Budapest, Hungary
****
GfK Custom Research North America
Minneapolis, MN, USA
*****
National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
Kyiv, Ukraine
******
La Trobe University
Melbourne, Australia
Table of Contents
Preface
Summary: There were 46 papers submitted for peer-review to this conference. Out of these, 23 regular papers were accepted for this volume.
Automated Organizational Management Systems of Critical Infrastructure: Security and Functional Stability
1-12
Oleksandr Dodonov
Olena Gorbachyk
and
Maryna Kuznietsova
Relaxation Time as Unique Characteristic for Networks Clustering
13-22
Andrii Snarskii
Dmytro Lande
and
Oleh Dmytrenko
Cyber Attacks Cascading Effects Simulation for Ukraine Power Grid
23-35
Oleksii Novikov
Georgy Vedmedenko
Iryna Stopochkina
and
Mykola Ilin
Determining Reasons of Political Rating Changes Based on Twitter Data
36-45
Taras Rudnyk
and
Oleg Chertov
Improvement of Pair-wise Comparison Methods Based on Graph Theory Concepts
46-55
Sergii Kadenko
Vitaliy Tsyganok
Zsombor Szádoczki
Sándor Bozóki
Patrik Juhász
and
Oleh Andriichuk
Machine Learning Techniques for Fault-tolerance Analysis and Forecasting
56-68
Nataliia Kuznietsova
Petro Bidyuk
Maryna Kuznietsova
and
Jules Lepretre
Data Protection on Business Intelligence Analytics Platform with Masking Level Adjustment
69-78
Mykhailo V. Kolomytsev
Nataliia M. Kussul
and
Svitlana O. Nosok
Calculation of the Integral Quality Index of a Scientific Event in the Context of the Interests of a Scientific Institution
79-91
Hryhorii Hnatiienko
Vitaliy Snytyuk
and
Nataliia Tmienova
Simulation Model of a Fuzzy Cyber Attack Detection System
92-101
Ihor Subach
Vitalii Fesokha
Artem Mykytiuk
Volodymyr Kubrak
and
Stanislav Korotayev
Development of Object's Structured Information Field with Specific Properties for its Semantic Model Building
102-111
Anatoly Gladun
Katerina Khala
and
Rodrigo Martinez-Bejar
Information Security of Printing Organizations
112-122
Dmytro Kucherov
Andriy Fesenko
Igor V. Ogirko
Olha I. Ogirkо
and
Andrei Berezkin
Improving the Efficiency of Typical Scenarios of Analytical Activities
123-132
Oleksandr V. Koval
Valeriy O. Kuzminykh
Iryna I. Husyeva
Xu Beibei
and
Zhu Shiwei
Fog Computing Architecture and their Analytical Models in Solving Problem Flows taking into account Failures and Features of Functioning
133-146
Aleksandr Matov
Increasing the Multi-position Signals Noise Immunity of Mobile Communication Systems Based on High-order Phase Modulation
147-157
Mykhailo Klymash
Liubov Berkman
Serhiy Otrokh
Volodymyr Pilinsky
Oleksandr Chumak
and
Olena Hryshchenko
An Approach to Security Environment Forecasting Based on Structuring of Foresight Process and on the Method of Goal Dynamic Evaluation of Alternatives
158-168
Vitaliy Tsyganok
Oleksandr Hryhorenko
Viktor Holota
Maksym Konovaliuk
and
Olha Tsyhanok
Prioritizing Cybersecurity Measures with Decision Support Methods Using Incomplete Data
169-180
Hryhorii Hnatiienko
Nikolay Kiktev
Tatiana Babenko
Alona Desiatko
and
Larysa Myrutenko
An Approach to Green Financial Credit Risks Modeling
181-192
Nataliia Kuznietsova
and
Rémi Amoroso
Algorithm for the Information Space Forming and the Evaluation of Input Objects Search Efficiency
193-204
Vadym Mukhin
Valerii Zavgorodnii
Yaroslav Kornaga
and
Lesia Baranovska
Distributed System of Intelligent Content Monitoring Agents
205-214
Artem Soboliev
and
Dmytro Lande
One Approach to Formation of Common Information Space Information Resource in Organizational Management Systems
215-224
Volodymyr Yuzefovych
Yevheniia Tsybulska
and
Oleh Andriichuk
Evaluation of Machine Learning Methods to Detect DoS / DDoS Attacks on IoT
225-236
Leonid Galchynsky
Mykola Graivoronskyi
and
Oleh Dmytrenko
Mereological Approach for Formation of “Part-Whole” Relations between Pages of a Semantic Wiki-resource
237-247
Julia Rogushina
and
Anatoly Gladun
Formation of Shift Index Vectors of Ring Codes for Information Transmission Security
248-257
Serhii Toliupa
Liubov Berkman
Serhiy Otrokh
Bohdan Zhurakovskyi
Valeriy Kuzminykh
and
Hanna Dudarieva
2022-10-07: submitted by Vitaliy Tsyganok,
metadata incl. bibliographic data published under
Creative Commons CC0
2022-10-12
: published on CEUR Workshop Proceedings (CEUR-WS.org, ISSN 1613-0073)
valid HTML5