


default search action
18th ITS 2018: Kyiv, Ukraine
- Aleksandr G. Dodonov, Dmitry V. Lande, Wlodzimierz Khadzhynov, Vitaliy V. Tsyganok, Andrei A. Snarskii, Oleg Chertov:

Selected Papers of the XVIII International Scientific and Practical Conference "Information Technologies and Security" (ITS 2018), Kyiv, Ukraine, November 27, 2018. CEUR Workshop Proceedings 2318, CEUR-WS.org 2019 - Aleksandr G. Dodonov, Dmitry V. Lande, Boris Berezin:

Semantic Models at Task Monitoring Public Opinions. 1-12 - Ihor Yakoviv, Vitaliy V. Tsyganok:

A Procedure for Assessing the State of Cybersecurity of Power Grids. 13-24 - Hryhorii Hnatiienko, Vitaliy Snytyuk, Oleh Suprun:

Application of Decision-making Methods for Evaluation of Complex Information System Functioning Quality. 25-34 - Andrey Arsenov, Igor Ruban, Kyrylo Smelyakov, Anastasiya Chupryna:

Evolution of Convolutional Neural Network Architecture in Image Classification Problems. 35-45 - Julia V. Rogushina, Anatoly Jasonovich Gladun, Serhii M. Pryima:

Use of Ontologies for Metadata Records Analysis in Big Data. 46-63 - Genadiy Churyumov, Vitalii Tkachov, Volodymyr Tokariev, Vladyslav Diachenko:

Method for Ensuring Survivability of Flying Ad-hoc Network Based on Structural and Functional Reconfiguration. 64-76 - Sergii V. Kadenko:

A Hybrid Method of Information Aggregation for Community-level Decision-making. 77-94 - Dmitry V. Lande, Oleh O. Dmytrenko, Andrei Snarskii:

Transformations of Texts into the Complex Network with Applying Visibility Graphs Algorithms. 95-106 - Dmytro Kucherov, Andrii Berezkin:

Protection of Information Networks Based on LoRa Technology. 107-117 - Nataliia Kuznietsova:

Analytical Technologies for Clients' Preferences Analyzing with Incomplete Data Recovering. 118-128 - Hryhorii Hnatiienko, Oleh Suprun:

Fuzzy Set Objects Clustering Method Using Evolution Technologies. 129-138 - Aleksandr Koval, Safwan Al Salaimeh, Oleh V. Andriichuk:

Usage of Expert Classification in Diagnostic Expert Systems' Knowledge Bases Construction. 139-149 - Aleksandr Matov:

Mathematical Models of Cloud Computing with Absolute-relative Priorities of Providing of Computer Resources to Users in Conditions of Functioning Features and Failures. 150-159 - Stanislav Bielievtsov, Igor Ruban, Kyrylo Smelyakov, Dmytro Sumtsov:

Network Technology for Transmission of Visual Information. 160-175 - Bogdan Korniyenko, Liliya Galata, Lesya Ladieva:

Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources. 176-187 - Serhii Otrokh, Valeriy Kuzminykh, Olena Hryshchenko:

Method of Forming the Ring Codes. 188-198 - Nataliia Tmienova, Bogdan Sus:

Hardware Data Encryption Complex Based on Programmable Microcontrollers. 199-208 - Mykyta Savchenko, Vitaliy V. Tsyganok, Oleh V. Andriichuk:

Decision Support Systems' Security Model Based on Decentralized Data Platforms. 209-221 - Dmitry Lande, Zijiang Yang, Shiwei Zhu, Jianping Guo, Moji Wei:

Automatic Text Summarization of Chinese Legal Information. 222-238 - Igor Subach, Alexander Chauzov:

Метод розподілу таблиць реляційної бази даних рівного об'єму та різними ймовірностями звертання до них в інформаційно-обчислювальній мережі АСУ (The Method of Distribution of Tables of a Relational Database of Equal Volume and Different Probabilities of Solving them in the Information and Computing Network of Automated Control Systems). 239-250 - Vitalii Zubok:

Метричний підхід до оцінки ризику кібератак на глобальну маршрутизацію (Metric Approach to Risk Evaluation of Cyberattacks on Global Routing). 251-260 - Aleksandr Dodonov, Olena Gorbachyk, Maryna Kuznietsova:

Підвищення живучості автоматизованих систем організаційного управління як шлях до безпеки критичних інфраструктур (Increasing the Survivability of Automated Systems of Organizational Management as a Way to Security of Critical Infrastructures). 261-270 - Iryna V. Balagura, Valentyna B. Andrushchenko, Ivan V. Gorbov:

Detection of Expert Groups for Scientific Expertise. 271-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














