Increasing the functional network stability in the depression zone of the hydroelectric power station reservoir

P Anakhov, V Zhebka, V Koretska… - … Trends on the …, 2022 - elibrary.kubg.edu.ua
Sphere of influence of the reservoirs of large HPS involves colossal massifs of rocks. The
complex of geophysical fields and processes, mechanical and electrical transformations …

EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communication

AK Yadav, K Singh, A Ahmadian, S Mohan… - … Informatics and Systems, 2021 - Elsevier
The rapid advancements in wireless technology and enhanced computing power of
handheld devices, enable the users to perform transactions anywhere, anytime during …

Method of building dynamic multi-hop VPN chains for ensuring security of terminal access systems

T Vitalii, B Anna, H Kateryna… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
International business groups are increasingly using terminal systems as workstations. At
the same time, virtual machine servers are often located in the head structure, while remote …

Analysis of Ways and Methods of Increasing the Availability of Information in Distributed Information Systems

V Astapenya, V Sokolov, P Skladannyi… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
The paper analyzes possible methods for ensuring the availability of information in wireless
access systems for remote subscribers. The prerequisites and positive aspects, as well as …

Technology of Location Hiding by Spoofing the Mobile Operator IP Address

Y Sadykov, V Sokolov… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
This paper discusses the issues of hiding geolocation when sending messages on social
networks, holding teleconferences, and sending emails. Single-board computers were used …

Ensuring Data Security in the Peer-to-Peer Economic System of the DAO

H Hulak, A Platonenko… - … Cybersecurity Providing in …, 2021 - elibrary.kubg.edu.ua
The article raises the problem of using in DAO, has a high level of interaction with
participants and participants, makes decisions, including using it with the help of …

Method of Sensor Network Functioning under the Redistribution Condition of Requests between Nodes

N Dovzhenko, H Haidur, Z Brzhevska… - … in Information and …, 2023 - elibrary.kubg.edu.ua
The results of previous studies show that relaying a significant number of requests between
sensor network nodes leads to a decrease in functional stability and an increase in the …

Bluetooth Low-Energy Beacon Resistance to Jamming Attack

V Sokolov, P Skladannyi… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
To assess the potential damage from jamming attacks on a Bluetooth Low-Energy (BLE)
Beacon device, an experimental setup with a packet emitter, sniffer, and signal spectrum …

Wi-Fi Repeater Influence on Wireless Access

V Sokolov, P Skladannyi… - 2023 IEEE 5th International …, 2023 - ieeexplore.ieee.org
The increase in the number of Wi-Fi hotspots is influenced by a combination of technological
advancements, changing user behavior, economic factors, and industry developments. The …

[PDF][PDF] Design Methodology of Cybersecurity Situational Center.

I Subach, D Mogylevych, A Mykytiuk, V Kubrak… - CPITS II (1), 2021 - ceur-ws.org
The process of designing a cybersecurity situational center as a complex organizational and
technical system is considered. It is proposed to consider the problem of designing the …