Mathematical Model for Finding Probability of Detecting Victims of Man-Made Disasters Using Distributed Computer System with Reconfigurable Structure and …

G Krivoulya, I Ilina, V Tokariev… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Issues related to the development of a method for planning the stages of rescuing victims of
man-made disasters using computer distributed systems with programmable logic and a …

Scenarios for implementation of nested virtualization technology in task of improving cloud firewall fault tolerance

V Tkachov, M Hunko, V Volotka - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Currently, the use of cloud firewalls allows protecting not only individual network resources,
but also the entire infrastructure of large data centers. The main requirement for a cloud …

Потокові моделі та методи маршрутизації в інфокомунікаційних мережах: відмовостійкість, безпека, масштабованість

ОВ Лемешко, ОС Єременко, ОС Невзорова - 2020 - openarchive.nure.ua
Анотація Монографія присвячена питанням, пов'язаним із синтезом математичних
моделей і методів маршрутизації, які б слугували подальшою теоретичною основою …

Investigation of the IoT device lifetime with secure data transmission

I Kuzminykh, A Carlsson, M Yevdokymenko… - … Conference on Next …, 2019 - Springer
This paper represents the approach for estimation of the lifetime of the IoT end devices. The
novelty of this approach is in the taking into account not only the energy consumption for …

The methods to improve quality of service by accounting secure parameters

T Radivilova, L Kirichenko, D Ageiev… - Advances in Computer …, 2020 - Springer
A solution to the problem of ensuring quality of service, providing a greater number of
services with higher efficiency taking into account network security is proposed. In this …

Method of building dynamic multi-hop VPN chains for ensuring security of terminal access systems

T Vitalii, B Anna, H Kateryna… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
International business groups are increasingly using terminal systems as workstations. At
the same time, virtual machine servers are often located in the head structure, while remote …

Methods for calculating the performance indicators of ip multimedia subsystem (IMS)

O Romanov, M Nesterenko, L Veres… - … on Mathematical Control …, 2019 - Springer
Today, Ukraine is actively working on solving the problems of convergence of networks of
various technologies, ensuring their compatibility in management, signaling and data traffic …

Investigation of the secure paths set calculation approach based on vulnerability assessment

M Yevdokymenko, O Yeremenko, A Shapovalova… - 2021 - openarchive.nure.ua
Анотація An approach to the calculation of secure paths based on the routing model taking
into account information security risks using the basic vulnerability criticality metrics is …

Design and research of the model for secure traffic engineering fast ReRoute under traffic policing approach

O Lemeshko, O Yeremenko… - 2021 IEEE 16th …, 2021 - ieeexplore.ieee.org
The work is devoted to the design and research of the mathematical model for Secure Traffic
Engineering Fast ReRoute under Traffic Policing (Secure TE-FRR-TP) approach. The task of …

Моделювання та оптимізація процесів безпечної та відмовостійкої маршрутизації в телекомунікаційних мережах

Анотація Монографія присвячена розв'язанню задач, пов'язаних із розробленням
математичних моделей для оптимізації процесів безпечної та відмовостійкої …