Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center

V Grechaninov, H Hulak, VY Sokolov… - … Trends on the …, 2022 - elibrary.kubg.edu.ua
In modern conditions of abrupt changes in the military-political situation, the problem of
ensuring the security and cyber protection of computer systems of situational centers of …

Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio

M TajDini, V Sokolov… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
This paper discusses the aviation Automatic Dependent Surveillance-Broadcast
Vulnerabilities such as Sniffing and Spoofing over it with the help of Software Defined Radio …

Bluetooth Low-Energy Beacon Resistance to Jamming Attack

V Sokolov, P Skladannyi… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
To assess the potential damage from jamming attacks on a Bluetooth Low-Energy (BLE)
Beacon device, an experimental setup with a packet emitter, sniffer, and signal spectrum …

[PDF][PDF] Risk assessment in critical infrastructure computer networks

I Zhukov, T Okhrimenko, S Balakin… - CEUR Workshop …, 2023 - ceur-ws.org
Risk assessment is an important domain of computer network security in critical and other
infrastructures. There are many approaches to risk analysis and assessment that can be …

Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio Channel

O Mykhaylova, A Stefankiv… - … in Information and …, 2024 - elibrary.kubg.edu.ua
This study focuses on the analysis of replay attacks, which pose a significant risk to remote
control systems using the 433 MHz radio frequency band. A replay attack occurs when an …

Novel Bluetooth Sniffer Test-Bed for Analyzing Real World Networks

S Nguyen, GM Wernsing, AM Wyglinski - IEEE Access, 2021 - ieeexplore.ieee.org
Bluetooth has solidified its status as one of the most prominent and versatile wireless
communication technologies alongside Wi-Fi. In spite of its widespread usage …

[PDF][PDF] Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 Requirements.

O Vakhula, Y Kurii, I Opirskyy, V Susukailo - CPITS, 2024 - ceur-ws.org
This article thoroughly examines and analyzes the latest iteration of the ISO/IEC 27001:
2022 standard, outlining the most contemporary requirements for information security …

[PDF][PDF] Comprehensive Approach for Developing an Enterprise Cloud Infrastructure.

V Khoma, A Abibulaiev, A Piskozub, T Kret - CPITS, 2024 - ceur-ws.org
The modern world is witnessing an incredibly rapid adoption of cloud technologies across
various sectors, making security in cloud environments extremely relevant. The problem lies …

Optimisation de la qualité de service (QoS) signal 5G pour le réseau d'accès radio (RAN-Radio Access Network)

B Zahreddine - 2023 - depositum.uqat.ca
La 5G, cinquième génération de technologie de télécommunications mobiles, offre des
débits de données accrus, une latence réduite et une connectivité améliorée pour les …

[PDF][PDF] Telecommunication Warning of the Crew about the Failure of On-Board Radio Altimeters

Y Hryshchenko, V Romanenko, O Chuzha… - 2024 - ceur-ws.org
The article is devoted to the study of the quality of aircraft steering at the landing stage in the
conditions of aircraft instrumentation failure. The paper shows that the quality of gliding …