O Yudin, R Ziubina, S Buchyk, O Frolov… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
The presented method of encoding and steganographic embedding of a series of bits for the hidden message was first developed by modifying the digital platform (bases) of the …
V Tkachov, M Bondarenko, O Ulyanov… - … on Advanced Trends …, 2019 - ieeexplore.ieee.org
Joint scientific experiments are the main way of international cooperation in the field of science. One of the ways to organize joint research is providing remote groups of scientists …
A mathematical model of the problem of determining critical nodes in complex weakly structured organizational systems is proposed. The use of graphs to model the relationships …
The paper presents approaches to determining the necessary and sufficient level of implementation of security measures presented in the" best practices" at a certain level …
E Polyakova, O Filonova… - SHS Web of …, 2021 - shs-conferences.org
The article is devoted to an urgent problem related to the security of critical information infrastructure. The introduction of digital technologies in all spheres of society is in line with …
P Khusainov, S Toliupa… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
A scientific rationale for cyber security measures is to be based on the use of a particular objective function. This objective function has to integrate and meaningfully describe: the …
IV Horbatyi - Mathematical modeling and computing, 2021 - science.lpnu.ua
The known analytical equations for calculating the symbol error rate (SER) in the M-ary telecommunication system are considered. The analytical equations for calculating SER in a …
S Toliupa, A Shevchenko, S Buchyk, I Pampukha… - CPITS II, 2023 - ceur-ws.org
Critical infrastructure has a multi-level structure, encompassing technical components, social aspects, organizational elements, and government involvement, all interconnected through …
The paper is devoted to the topical issue of the development of methods for increasing the survivability of information systems in conditions of malicious harmful influences. The …