ZigBee Network Resistance to Jamming Attacks

V Sokolov, P Skladannyi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The growth in the number of wireless devices, particularly in the context of the Internet of
Things, has significant implications for their security. While wireless technologies enable …

Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network

Y Kostiuk, P Skladannyi, N Korshun… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This paper presents an integrated approach to enhancing the security of adaptive video
streams transmitted over Bluetooth wireless networks with increased data transfer rates …

Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel

O Mykhaylova, A Stefankiv… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This study focuses on the analysis of replay attacks, which pose a significant risk to remote
control systems using the 433 MHz radio frequency band. A replay attack occurs when an …

Experimental determination of protective signal parameters for effective “swinging” of the carrier frequency of high-frequency imposition

L Kriuchkova, I Tsmokanych, N Mazur… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The publication is devoted to the improvement of protective effects on dangerous signals
formed by high-frequency imposition to ensure the maximum possible destruction of their …

Influence of Protective Signals on Dangerous Signals of High-Frequency Imposition

L Kriuchkova, I Tsmokanych, M Vovk… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The method of active protection of information from interception by methods of high-
frequency imposition is considered, in which targeted jamming protective signals are …

[PDF][PDF] Comprehensive Approach for Developing an Enterprise Cloud Infrastructure.

V Khoma, A Abibulaiev, A Piskozub, T Kret - CPITS, 2024 - ceur-ws.org
The modern world is witnessing an incredibly rapid adoption of cloud technologies across
various sectors, making security in cloud environments extremely relevant. The problem lies …

[PDF][PDF] Дисертація «Моделі та методи забезпечення захисту інформації, що передається відкритими каналами в мережах інтернету речей»

РМ Черненко - 2024 - elibrary.kubg.edu.ua
КИЇВСЬКИЙ СТОЛИЧНИЙ УНІВЕРСИТЕТ ІМЕНІ БОРИСА ГРІНЧЕНКА Кваліфікацій
Page 1 КИЇВСЬКИЙ СТОЛИЧНИЙ УНІВЕРСИТЕТ ІМЕНІ БОРИСА ГРІНЧЕНКА …

[PDF][PDF] Enhancing Sensor Network Efficiency Through Optimized Flooding Mechanism

N Dovzhenko, O Barabash, A Musienko, Y Ivanichenko - 2024 - ceur-ws.org
Sensor networks play a crucial role in modern technologies, especially with the widespread
implementation of the Internet of Things, where they are used for collecting data from the …

APPLICATION OF IOT PROTOCOLS IN SURFACE WATER POLLUTION MONITORING SYSTEMS

А Коваленко - Електронне фахове наукове видання « …, 2024 - csecurity.kubg.edu.ua
The rapid pace of industrial growth and the rise in consumerism are increasingly
contributing to the deterioration of water quality, posing significant risks to both ecological …