default search action
22nd ITS 2022: Kyiv, Ukraine
- Aleksandr Dodonov, Dmitry Lande, Vitaliy V. Tsyganok, Nikolai Stoianov, Sándor Bozóki, Stan Lipovetsky, Andriy Olenko, Sergii V. Kadenko, Oleg Chertov, Oleh V. Andriichuk:
Selected Papers of the XXII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2022), Kyiv, Ukraine, November 16, 2022. CEUR Workshop Proceedings 3503, CEUR-WS.org 2023 - Oleksandr Dodonov, Olena Gorbachyk, Maryna Kuznietsova:
Analysis and Assessment of Functional Stability of Information Systems Supporting Management Processes. 1-10 - Dmytro Lande, Andrei Snarskii, Oleh O. Dmytrenko, Chen Li, Xianyi Li, Jianping Guo:
Formation of Network of Scientists in Cybersecurity Field. 11-20 - Vitaliy V. Tsyganok, Anton Astakhov, Volodymyr Minas, Maksym Konovaliuk:
Knowledge Transfer Platform Toolkit for Strategic Planning. 21-31 - Oleh V. Andriichuk, Sergii V. Kadenko:
Ranking-dependent Decision Support Methods for Weakly-structured Domains. 32-41 - Nataliia D. Pankratova, Illia Savchenko:
Detecting and Constructing Morphological Tables Using Weakly Structured Data Analysis Results. 42-51 - Oleksandr V. Koval, Valeriy O. Kuzminykh, Iryna I. Husyeva, Beibei Xu, Shiwei Zhu:
Adaptive Software System for International Activity Level Assessment. 52-61 - Hryhorii Hnatiienko, Tetiana Babenko:
Quantitative Assessment of the Criticality Level of Organizational System Elements. 62-81 - Lesia Baranovska, Vadym E. Mukhin:
Group Pursuit Problem for Fraction Differential Systems with Pure Delay. 82-91 - Nataliia Kuznietsova, Eduard Bateiko:
Analysis and Development of Mathematical Models for Assessing Investment Risks in Financial Markets. 92-101 - Julia V. Rogushina, Anatoly Y. Gladun:
Semantic Approach to Decision Making in Comparison of Complex Objects. 102-114 - Dmytro Lande, Olexander Puchkov, Ihor Subach:
Method of Detecting Cybersecurity Objects Based on OSINT Technology. 115-124 - Dmytro P. Kucherov, Tetiana Shmelova:
Monitoring of a Critical Infrastructure Facility by UAVs. 125-140 - Ivan Horniichuk, Vitaliy V. Tsyganok, Viktor Evetskyi, Artem Mykytiuk:
Model of Handwritten Signature Based User Authentication. 141-150 - Ihor Subach, Dmytro Mogylevych, Artem Mykytiuk, Volodymyr Kubrak, Vitalii Fesokha:
Models of Fuzzy Identification of Cyber Incidents in Information and Communication Systems by Intelligent SIEM Systems. 151-160 - Hryhorii Hnatiienko, Oleh Ilarionov, Larysa Myrutenko, Oksana Vlasenko, Snizhana Gamotska:
An Intelligent Cloud-based System for Conduction of an Enrollment Campaign. 161-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.