Optimization of Machine Learning Method to Improve the Management Efficiency of Heterogeneous Telecommunication Network

V Zhebka, M Gertsiuk, V Sokolov… - … in Information and …, 2022 - elibrary.kubg.edu.ua
This paper presents some optimization method aspects use in telecommunications
networks. The use of optimization methods by machine learning means is especially …

[HTML][HTML] Resilient cloud cluster with DevSecOps security model, automates a data analysis, vulnerability search and risk calculation

ASA Alghawli, T Radivilova - Alexandria Engineering Journal, 2024 - Elsevier
Automated, secure software development is an important digitalization task, solved with the
DevSecOps approach. An important part of the DevSecOps approach is continuous risk …

[PDF][PDF] Parameters of Aiming Interfering Signals for Information Protection from Leaks by High-Frequency Channel Imposition

L Kriuchkova, M Vovk, I Tsmokanych… - … Providing in Information …, 2021 - ceur-ws.org
A method of blocking information interception channels by high-frequency “imposition”
methods is considered, in which targeted active noise protection signals are introduced into …

Models and Methods for Determining Application Performance Estimates in Distributed Structures

V Grechaninov, O Khoshaba, H Hulak… - … in Information and …, 2022 - elibrary.kubg.edu.ua
The method of evaluating the operation of service programs at nodes of the distribution
system is proposed, which consists in the use of a predictive control model, is proposed. A …

Problematic Issues of the Accelerating Lens Deployment

V Astapenia, V Sokolov… - 2022 IEEE 2nd Ukrainian …, 2022 - ieeexplore.ieee.org
The paper is a continuation of the earlier studies of the characteristics of accelerating metal-
plate lenses (AMPL) carried out by the authors, intended for use in antenna devices of …

Methods of Modeling Database System Security

S Rzaieva, D Rzaiev, Y Kostyuk… - … in Information and …, 2024 - elibrary.kubg.edu.ua
Ensuring the protection of information stored in databases from unauthorized access, loss,
and damages, as well as ensuring the confidentiality, integrity, and availability of data is a …

[PDF][PDF] Methodology of FPGA Implementation and Performance Evaluation of Polar Coding for 5G Communications.

J Boiko, V Druzhynin, S Buchyk, I Pyatin, A Kulko - CPITS, 2024 - ceur-ws.org
This article is devoted to the study of noise immunity of an infocommunication system with
Polar Coding (PC). The results of evaluating the performance of the Successive …

Influence of Protective Signals on Dangerous Signals of High-Frequency Imposition

L Kriuchkova, I Tsmokanych, M Vovk… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The method of active protection of information from interception by methods of high-
frequency imposition is considered, in which targeted jamming protective signals are …

[PDF][PDF] Ontological-Relational Data Store Model for a Cloud-based SIEM System Development.

V Sydorenko, O Zhyharevych, R Berdybaev… - CPITS, 2024 - ceur-ws.org
Abstract Security Information and Event Management (SIEM) systems are widely used to
prevent information loss in computer systems and networks. Currently, there are different …

[PDF][PDF] Diceware Password Generation Algorithm Modification based on Pseudo-Random Sequences.

S Buchyk, N Lukova-Chuiko, S Toliupa, V Piatyhor… - CPITS II (2), 2021 - ceur-ws.org
The authors investigated main algorithms for generating passwords that exist in the market
and analysed their advantages and disadvantages. The complexity of the generated …