Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Olesia Voitovych"'
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 2, Iss 18, Pp 86-98 (2022)
Соціальні мережі все частіше використовуються як джерело інформації, в тому числі про події під час війни. Фейкові акаунти в соціальних
Externí odkaz:
https://doaj.org/article/1710999202744002b4e233e64eb76626
Publikováno v:
Цифрова платформа: інформаційні технології в соціокультурній сфері, Vol 0, Iss 2, Pp 93-105 (2018)
Having regard to the last events in our country, it is possible to assert that network the Internet gradually became the source of threats to informative safety of man, society, state, as distribution in the global network of doubtful and biased cont
Externí odkaz:
https://doaj.org/article/9443240cb52f45c5b78c095a090a6809
Publikováno v:
Cybersecurity: Education, Science, Technique. 2:86-98
Social media is becoming increasingly used as a source of information, including events during warfare. The fake accounts of the social media are often used for a variety of cyber-attacks, information-psychological operations, and social opinion mani
Autor:
Oleg Avrunin, Yana Nosova, Nataliia Shushliapina, Ibrahim Younouss Abdelhamid, Olesia Voitovych, Aliya Kalizhanova, Aida Uvaysova, Zbigniew Omiotek
Publikováno v:
Photonics Applications in Astronomy, Communications, Industry, and High Energy Physics Experiments 2022.
Autor:
Daniel Sawicki, Bohdan V. Kulchytskyi, Andrii V. Kozhemiako, Leonid Kupershtein, Olesia Voitovych, Mashat Kalimoldayev, T. B. Martyniuk
Publikováno v:
Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2019.
There are research results of artificial neural networks usage for solving a hardly formalized objective – detection of a DDoS attacks on the computer network information resource in this article. An analysis of existing methods, technologies and t
Publikováno v:
2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
The analysis of modern database management systems and their security allows highlighting the main problem-poor protection against loss of user authentication data and the use of discretionary access control mechanism to the management function. Mult
Publikováno v:
2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
Rootkits detecting in the Windows operating system is an important part of information security monitoring and audit system. Methods of hided process detection were analyzed. The software is developed which implements the four methods of hidden proce
Publikováno v:
2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON).
Existing wireless sensor network are developing rapidly and soon will occupy a dominant place among the data collection and communication. The remote location of the sensors and automatic operation increases their vulnerability to outside intrusions