Video presentations of Forum “Digital Reality 2023” participants

Video presentations of Forum "Digital Reality" participants


Forum “Cyber security and information technologies in the conditions of hybrid wars”

  1. Deforestation and Reforestation Detection as Part of Development of Forestry Accounting Application.
  2. Analysis of the dependence of Ukrainian water transport enterprises ‘ profitability on the IT-innovations implementation.
  3. Sociocyberphysical System Wireless Air Network Topology Synthesis Model.
  4. ISO/IEC 27001:2022 – Analysis of Changes and Compliance Features of the New Version of the Standard.
  5. Entropy Method for Assessing the Strength of Encryption Algorithms.
  6. Computer modeling of nonlinear flutter of Viscoelastic based plate as a sustainable mechanical engineering approach in aircraft structures’ design.
  7. A method based on fuzzy logic inference for signature analysis of outgoing traffic packets.
  8. Cybersecurity challenges and solutions for critical infrastructure protection.
  9. Analysis of information security under the conditions of hybrid war in Ukraine: social aspects.
  10. Cybersecurity of Business Structures in Social Networks.
  11. Methodology Of Building Energy-Efficient Automation Systems Of Industrial Facilities With Product Quality Monitoring.
  12. Systematism in detecting errors during testing of hardware and software complexes of the “Internet of Things “.
  13. The advantages of nonlinear cryptographic primitives and their areas of use.
  14. Issues of Selecting an Instrument of Continuous Integration for Software Automated Testing.
  15. Redundancy network synchronization for mobile communication under martial law.
  16. Graph Algorithms Visualization.
  17. Machine Learning of Software Agents for Classification Sociotypes.
  18. The method of searching for textual information in the databased on the improvement of the dynamic model
  19. A systemic approach to the problem of reliability control when designing electronic devices.
  20. Analysis of Cryptographic Authentication and Manipulation Detection Methods for Big Data.
  21. Rationale for Improving Authentication Protocols in the Conditions of Post-Quantum Cryptography.
  22. An Approach to Artificial Neural Network Training for Staffing Military Organizational Structures.
  23. Asymptotic Approach to Recovering of Human-Machine Systems.
  24. Method for Analyzing the Connection Between the Regional Population and Social Network Narratives Under of the Information Operation.
  25. FOREST COVER MONITORING BASED ON THE USING OF PROSPECTIVE EARTH REMOTE SENSING SYSTEMS.
  26. Identification of the Most Significant Threats to the Smart Home Cyber-Physical System.
  27. Method for Reducing the Frequency Spectrum Overlaying Error in Digital Narrow-Band Filtration.
  28. Secret Distribution in Hybrid Wars Conditions.
  29. Analysis of Properties of Generalized Hölder Classes in Signal Theory.
  30. Using the Fourier series summation method in applied signal processing problems.
  31. On Application of Generalized Chebyshev Polynomials to Signal Processing.
  32. Functional Stability of Technological Processes Using Controllability of Discrete Systems. Part 1.
  33. Functional Stability of Technological Processes Using Controllability of Discrete Systems. Part 2.
  34. The Built on Feistel Network Architecture Block Ciphers Modification.
  35. Selection of a Subset of Effective Project Solutions Under Conditions of Interval Uncertainty of Their Characteristics. Part 1
  36. Selection of a Subset of Effective Project Solutions Under Conditions of Interval Uncertainty of Their Characteristics. Part 2.
  37. Increasing the resistance of the steganosystem to attacks against an embedded message by selection of container blocks. Part 1.
  38. Increasing the resistance of the steganosystem to attacks against an embedded message by selection of container blocks. Part 2.
  39. DevRel Strategy for Consumer-Brand Relations in the frame of Evangelistic Marketing.
  40. The analytical structure of the security of information technologies for the neural network-based detection of deepfake modifications of a biometric image.
  41. Integration of security software development with project management lifecycle.
  42. Designing a mechanism for balancing computations between nodes in a distributed local network system.
  43. Dependence of the algebraic nonlinearity of 4-functions of two variables from the cryptographic properties of their component Boolean functions.
  44. Peculiarities of the Analysis of Russian Narratives in the Information Space.
  45. Web application security testing tools.
  46. Method for Detecting FDI Attacks on Intelligent Power Networks.
  47. Methods security management of mobile subscriber devices in corporate networks.
  48. A method for analyzing the evolution of virtual communities of media platforms for detecting social bot networks (on the example of Youtube).
  49. Informational Decision Support System for Modeling Nonstationary Processes inFinancial Sphere.
  50. On the Essence of Cyber Space and its Relationship with Cybernetic Space.
  51. Conditions for Solving the Multi-сriteria Transport Problem Applying the Method of Matrix Factor Analysis.
  52. Object-oriented model of formal description of the information and communication system.
  53. Advanced Information Technologies (C4ISR) in the peacekeeping field service.
  54. Joint All Domain Command and Control (JADC2) System as a Multi-Domain Operations (MDO) Concept Basis for the Defense of Ukraine. Part 1.
  55. Joint All Domain Command and Control (JADC2) System as a Multi-Domain Operations (MDO) Concept Basis for the Defense of Ukraine. Part 2.
  56. Cluster Modieling of the Interaction of Statyonary SH-Waves With a System of Curvilinear Cracks in a Half-Space. Part 1.
  57. Cluster Modieling of the Interaction of Statyonary SH-Waves With a System of Curvilinear Cracks in a Half-Space. Part 2.
  58. A Method of Identifying and Evaluating Target Audiences Based on the Process of Segmenting the Object of Influence Based on the Results of the Analysis of Open Sources of Information.
  59. Models of Control of Message Transmission on Communication Networks of Special Purpose.
  60. Method for Analyzing the Connection Between the Regional Population and Social Network Narratives Under of the Information Operation.
  61. Self-Masking Effect of Parallel Presented Data to Ensure Protection of Information in Technical Channels of Leakage. Part 2.
  62. Self-Masking Effect of Parallel Presented Data to Ensure Protection of Information in Technical Channels of Leakage. Part 3.

Nataliia Liubchenko, Andrii Podorozhniak and Daniil Onishchenko.

Deforestation and Reforestation Detection as Part of Development of Forestry Accounting Application.

Svitlana Ilchenko, Vadym Gryshchenko and Iryna Gryshchenko.

Analysis of the dependence of Ukrainian water transport enterprises ‘ profitability on the IT-innovations implementation.

Nataliia Dzheniuk, Serhii Yevseiev, Ivan Opirskyy, Natalia Voropay, Roman Korolev, Zoia Sydorenko.

Sociocyberphysical System Wireless Air Network Topology Synthesis Model.

Yevhenii Kurii, Ivan Opirskyy.

ISO/IEC 27001:2022 – Analysis of Changes and Compliance Features of the New Version of the Standard.

Serhii Yevseiev, Stanislav Milevskyi, Olena Akhiiezer, Olha Korol, Marta Stakhiv, Roman Stakhiv.

Entropy Method for Assessing the Strength of Encryption Algorithms.

Sergii Polozhaenko, Oleksandr Fomin, Valentyn Krykun, Andrii Orlov and Andrii Prokofiev.

Computer modeling of nonlinear flutter of Viscoelastic based plate as a sustainable mechanical engineering approach in aircraft structures’ design.

Julia Khokhlacheva, Nataliia Petliak, Yurii Klots and Vira Titova.

A method based on fuzzy logic inference for signature analysis of outgoing traffic packets.

Andrii Tkachov.

Cybersecurity challenges and solutions for critical infrastructure protection.

Yurii Gunchenko, Volodymyr Dzhulii, Serhii Lienkov, Oleksandr Sieliukov, Ihor Muliar, Larysa Dzhulii.

Analysis of information security under the conditions of hybrid war in Ukraine: social aspects.

Iryna Mysiuk, Roman Mysiuk, Volodymyr Yuzevych, Ruslan Skrynkovskyy, Ruslana Kramar, Grzegorz Pawlowski and Yuriy Tyrkalo.

Cybersecurity of Business Structures in Social Networks.

Igor Bolbot, Vitaliy Lysenko, Valerii Koval, Taras Lendiel, Kateryna Nakonechna, Anastasija Bolbot.

Methodology Of Building Energy-Efficient Automation Systems Of Industrial Facilities With Product Quality Monitoring.

Ilnara Sharipova, Ivan Kovalenko, Sergіy Stukalov.

Systematism in detecting errors during testing of hardware and software complexes of the “Internet of Things “.

Serhii Lienkov, Ihor Muliar٭, Volodymyr Anikin, Volodymyr Dzhulii, Evgeny Lenkov, Vitalii Tarhonskyi.

The advantages of nonlinear cryptographic primitives and their areas of use.

Liudmyla Gryzun, Valentyna Pikalova, Lilia Bodnar.

Issues of Selecting an Instrument of Continuous Integration for Software Automated Testing.

Valerii Koval, Vyacheslav Vakas, Nataliia Fedorova, Vitaliy Lysenko, Igor Bolbot, Dmytro Domin, Olexander Samkov.

Redundancy network synchronization for mobile communication under martial law.

Olena Trofymenko, Yuliia Prokop, Nataliia Loginova, Dmytro Novikov, Olexander Zadereyko and Yuliia Loboda.

Graph Algorithms Visualization.

Serhii Holub, Oleksandr Mоrusko, Natalii Khymytsia, Maria Holub.

Machine Learning of Software Agents for Classification Sociotypes.

Oleksandr Laptiev, Valentyn Sobchuk, Vitalii Savchenko, Andrii Musienko, Andrii Barabash, Igor Polovinkin.

The method of searching for textual information in the databased on the improvement of the dynamic model.

Volodymyr Azarenkov.

A systemic approach to the problem of reliability control when designing electronic devices.

Alla Havrylova, Yuliia Khokhlachova, Stanislav Milevskii, Olha Korol and Natalia Voropay.

Analysis of Cryptographic Authentication and Manipulation Detection Methods for Big Data.

Alla Havrylova, Andrii Tkachov, Yuliia Khokhlachova, Yurii Punda, Vadym Mashtalir and Natalia Voropay.

Rationale for Improving Authentication Protocols in the Conditions of Post-Quantum Cryptography.

Oleksandr Prokopenko, Anatolii Rybydajlo, Ihor Sivokha, Dmytro Prokopenko.

An Approach to Artificial Neural Network Training for Staffing Military Organizational Structures.

Igor V. Naumeyko.

Asymptotic Approach to Recovering of Human-Machine Systems.

Yuliіa Tkach, Anatolii Shyian, Olha Vasylieva, Oleksandr Chobal.

Method for Analyzing the Connection Between the Regional Population and Social Network Narratives Under of the Information Operation.

Serhii Lienkov, Sergiy Slastin, Natalia Pasichnyk, Sergey Shvorov, Anatolii Shevchenko and Nataliia Lytvynenko.

FOREST COVER MONITORING BASED ON THE USING OF PROSPECTIVE EARTH REMOTE SENSING SYSTEMS.

Serhii Pohasii, Stanislav Milevskyi, Olha Korol, Natalia Voropay.

Identification of the Most Significant Threats to the Smart Home Cyber-Physical System.

Serhii Herasymov, Viacheslav Soroka, Stanislav Milevskyi, Vladyslav Khvostenko, Yelyzaveta Sevriukova, Mykhailo Prygara.

Method for Reducing the Frequency Spectrum Overlaying Error in Digital Narrow-Band Filtration.

Serhii Yevseiev, Bogdan Tomashevsky, Valeriy Dudykevych, Stanislav Milevskyi, Olha Korol, Natalia Voropay.

Secret Distribution in Hybrid Wars Conditions.

Oleg Barabash, Andrii Musienko, Andriy Makarchuk, Oleksandr Laptiev, Ivanna Salanda.

Analysis of Properties of Generalized Hölder Classes in Signal Theory.

Roman Tovkach, Pavel Open’ko, Yurii Kolomiiets, Sergiy Bazilo, Igor Polovinkin, Maxsim Kuzmenko.

Using the Fourier series summation method in applied signal processing problems.

Anton Mishchuk, Tetiana Voloshyna, Michaylo Voloshyn, Mykola Myroniuk, Oleksiy Maistrov, Igor Polovinkin.

On Application of Generalized Chebyshev Polynomials to Signal Processing.

Volodymyr Pichkur, Valentyn Sobchuk, Dmytro Cherniy, Volodymyr Matvienko, Juliia Fedorenko and Andrii Pankov.

Functional Stability of Technological Processes Using Controllability of Discrete Systems. Part 1.

Volodymyr Pichkur, Valentyn Sobchuk, Dmytro Cherniy, Volodymyr Matvienko, Juliia Fedorenko and Andrii Pankov.

Functional Stability of Technological Processes Using Controllability of Discrete Systems. Part 2.

Inna Rozlomii, Andrii Yarmilko and Serhii Naumenko.

The Built on Feistel Network Architecture Block Ciphers Modification.

Volodymyr V. Bezkorovainyi, Liudmyla V. Kolesnyk and Volodymyr М. Russkin.

Selection of a Subset of Effective Project Solutions Under Conditions of Interval Uncertainty of Their Characteristics. Part 1.

Volodymyr V. Bezkorovainyi, Liudmyla V. Kolesnyk and Volodymyr М. Russkin.

Selection of a Subset of Effective Project Solutions Under Conditions of Interval Uncertainty of Their Characteristics. Part 2.

Ivan Bobok, Alla Kobozieva, Nataliya Kushnirenko and Serhiy Sokalskiy.

Increasing the resistance of the steganosystem to attacks against an embedded message by selection of container blocks. Part 1.

Ivan Bobok, Alla Kobozieva, Nataliya Kushnirenko and Serhiy Sokalskiy.

Increasing the resistance of the steganosystem to attacks against an embedded message by selection of container blocks. Part 2.

Maryna Chaikovska, Oleksandr Shkeda.

DevRel Strategy for Consumer-Brand Relations in the frame of Evangelistic Marketing.

Valeriy Dudykevych, Serhii Yevseiev, Halyna Mykytyn, Khrystyna Ruda.

The analytical structure of the security of information technologies for the neural network-based detection of deepfake modifications of a biometric image.

Andrii Hapon, Volodymir Fedorchenko, Dmytro Rykov, Оleksandr Sievierinov.

Integration of security software development with project management lifecycle.

Vladyslav Lubenets, Natalia Khatsko, Kyrylo Khatsko.

Designing a mechanism for balancing computations between nodes in a distributed local network system.

Nadiia Kazakova, Artem Sokolov and Nataliia Balandina.

Dependence of the algebraic nonlinearity of 4-functions of two variables from the cryptographic properties of their component Boolean functions.

Vitalii Fedoriienko, PhD (Technical), Mariya Podybailo PhD (Historical), Oleksandr Kulchitskyi, Olha Onofriichuk, Yaroslav Lashyn .

Peculiarities of the Analysis of Russian Narratives in the Information Space.

Anastasiia Dyka, Olena Trofymenko, Yuliia Loboda and Yuliia Prokop.

Web application security testing tools.

Vitalii Martovytskyi, Oleksandr Sievierinov, Vasyl Kotsiuba, Dmytro Nepokrytov, Serhii Florov, Dmytro Konov.

Method for Detecting FDI Attacks on Intelligent Power Networks.

Vadym Poddubnyi, Oleksandr Sievierinov, Roman Gvozdov, Zoia Sydorenko, Dmytro Prokopovych-Tkachenko, Mykola Mormul.

Methods security management of mobile subscriber devices in corporate networks.

Serhiy Veretiuk, Kateryna Molodetska.

A method for analyzing the evolution of virtual communities of media platforms for detecting social bot networks (on the example of Youtube).

Polozhaenko Sergii, Huskova Vira, Bidyuk Petro.

Informational Decision Support System for Modeling Nonstationary Processes inFinancial Sphere.

Petro Snitsarenko, Yurii Sarychev, Valеrii Hordiichuk.

On the Essence of Cyber Space and its Relationship with Cybernetic Space.

Sergii Mogilei, Artem Honcharov, Oleksandr Havrysh.

Conditions for Solving the Multi-сriteria Transport Problem Applying the Method of Matrix Factor Analysis.

Vadym Poddubnyi, Oleksandr Sievierinov, Andrii Yevheniev, Zoia Sydorenko, Vladyslav Sukhoteplyi.

Object-oriented model of formal description of the information and communication system.

Valerii Hordiichuk, Vitalii Zlakoman, Nina Andriianova, Nataliia Bihun .

Advanced Information Technologies (C4ISR) in the peacekeeping field service.

Valerii Hordiichuk, Vitalii Zlakoman.

Joint All Domain Command and Control (JADC2) System as a Multi-Domain Operations (MDO) Concept Basis for the Defense of Ukraine. Part 1.

Valerii Hordiichuk, Vitalii Zlakoman.

Joint All Domain Command and Control (JADC2) System as a Multi-Domain Operations (MDO) Concept Basis for the Defense of Ukraine. Part 2.

Borys Panchenko, Liudmyla Bukata, Denys Bahachuk, Larysa Martynovych and Oksana Zui.

Cluster Modieling of the Interaction of Statyonary SH-Waves With a System of Curvilinear Cracks in a Half-Space. Part 1.

Borys Panchenko, Liudmyla Bukata, Denys Bahachuk, Larysa Martynovych and Oksana Zui.

Cluster Modieling of the Interaction of Statyonary SH-Waves With a System of Curvilinear Cracks in a Half-Space. Part 2.

Оleksandr Voitko, Volodymyr Rakhimov, Vladislav Solonnikov, Tetiana Voitko, Maksym Tolkachov.

A Method of Identifying and Evaluating Target Audiences Based on the Process of Segmenting the Object of Influence Based on the Results of the Analysis of Open Sources of Information.

Oleksandr Milov, Oleksandr Shmatko, Vadym Mashtalir, Nataliia Zviertseva,Yevhen Motalyhin, Herman Zviertsev.

Models of Control of Message Transmission on Communication Networks of Special Purpose.

Yuliia Tkach, Anatolii Shyian, Olha Vasylieva and Oleksandr Chobal.

Method for Analyzing the Connection Between the Regional Population and Social Network Narratives Under of the Information Operation

Serhii Ivanchenko, Anatolii Holishevskyi, Oleksandr Dranovych, Oleksii Gavrylenko.

Self-Masking Effect of Parallel Presented Data to Ensure Protection of Information in Technical Channels of Leakage. Part 2.

Serhii Ivanchenko, Anatolii Holishevskyi, Oleksandr Dranovych, Oleksii Gavrylenko.

Self-Masking Effect of Parallel Presented Data to Ensure Protection of Information in Technical Channels of Leakage. Part 3.

Comments are closed.