Methods and technologies for ensuring cybersecurity of industrial and web-oriented systems and networks

O Morozova, A Nicheporuk, A Tetskyi… - … and computer systems, 2021 - nti.khai.edu
The subject matter of the article is methods and technologies of ensuring the cybersecurity of
industrial and web-oriented systems and networks, training of cybersecurity specialists …

The software tool for identifying the cellular network status of a mobile device under the Android operating system

MA Hunko, KA Voropaeva - 2021 - openarchive.nure.ua
Анотація The task of developing a software package to determine the occupancy of the
communication line is relevant and in demand today. For this development it is not enough …

Method to Determine Fault-Tolerant Performance Probability of High-Survivability Computer Network based on Mobile Platform

V Tkachov, M Hunko, O Morozova… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
Computer networks based on a mobile platform are becoming widespread. There are a
number of characteristics according to which such networks can be classified. One such …

Application prospects of first hop redundancy protocols for fault-tolerant SDN controllers: a survey

O Lemeshko, A Mersni, O Yeremenko… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
This paper is devoted to surveying recent efforts to overcome fault-tolerance issues in the
Software-Defined Network control plane. Additionally, it has proposed an approach to adopt …

Method for determining the mobile network line occupancy of Android device

MA Hunko, DV Hrecmak - 2021 - openarchive.nure.ua
Анотація Today, mobile devices are more than a communication device, but also a personal
assistant, a planner and a device for entertainment. but still the main unchanged function is …

Design and Validation of a Testing 4D Mechatronic System for Measurement and Integrated Control of Processes

I Ilie, J Machado - Machines, 2022 - mdpi.com
Measurements are crucial for research in the fields of microelectromechanical (MEMS),
nanoelectromechanical (NEMS) and industrial applications. In this work, the design …

Securing the Internet of Things via VPN technology

M Hunko, I Ruban, K Hvozdetska - COMPUTER AND INFORMATION …, 2021 - csitic.nure.ua
The speed at which the Internet of Things is evolving these days looks promising for the
smart environment of the future. Along with the popularity of smart devices, concerns about …

[PDF][PDF] An Enhanced Traffic Split Routing Heuristic for Layer 2 and Layer 1 Services

A Harchay, A Berguiga… - International Journal of …, 2022 - pdfs.semanticscholar.org
Virtual Private Networks (VPNs) have now taken an important place in computer and
communication networks. A virtual private network is the extension of a private network that …

[PDF][PDF] Порівняння симетричного і асиметричного шифрування

КП Гвоздецька, МВ Філіпєва - 2021 - openarchive.nure.ua
Симетричний алгоритм підходить для передачі великих обсягів шифрованих даних.
Асиметричний алгоритм, за інших рівних, буде значно повільніше. Крім того, для …

Аналіз алгоритмів маршрутизації в анонимних оверлейних мережах

ІС Чепурна, ІС Заброда - 2024 - repository.kpi.kharkov.ua
Організація корпоративних комп'ютерних мереж з високим рівнем захисту даних стає
актуальним завданням в сучасному інформаційному середовищі з постійними …