Department of Information Technology Security

Language:

Round table at the Department of Information Technology Security

    On the ITS department hosted an online round table discussion on the exchange of experience between the teachers of the department on participation in international conferences with the publication of materials in well-known and cited international scientometric databases.

    The issues of preparation of materials, methods of distribution through contacts with the international community were discussed. The successful work of the teachers of the department related to publications in international publications was also noted, which is especially relevant during the period of quarantine restrictions.

           So only in recent months the following works have been published:

 1. A.V.Vlasov Information security condition analysis in EMM systems // Den Materialien der internationalen wissenschaftlich-praktischen Konferenz, “Die Wichtigsten vektoren für die Entwicklung der Wissenschaft im Jahr 2020”. Luxembourg, Grand Duchy of Luxembourg: Europäische Wissenschaftsplattform. Abschnitt IV. Technische wissenschaften. pp.51–53. DOI: doi.org/10.36074/24.01.2020.v14 ISBN 978-3-906359-72-4.

2.Kuznetsov A., Oleshko I., Chernov K. and Bagmut M., 2019. Biometric images attacks detecting using convolutional neural networks. ISCI’2019: Information security in critical infrastructures. ASC Academic Publishing, Minden, Nevada, USA. P. 396-411. Scopus.

3.Oleksii Nariezhnii, Daniel Jancarczyk, Ivan Gorbenko, Tetiana Grinenko, Vasyl Martsenyuk. Method of Generating Random Numbers by the Group of Quantum Generators of Random Numbers in the Synchronization Mode. The 5th IEEE International Symposium on Smart and Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems. IEEE IDAACS-SWS 2020. 17-18 September, 2020, Dortmund, Germany, pp. 93-98. Scopus.

4.Kolomiitsev O., Petrenko O., Petrenko O., Tretiak V., Sachuk I., Kruk B., Combined method of navigation information protection in unmanned aerial systems control lines with using global navigation satellite systems ephemeris modification algorithmand streaming cipher//Tendances scientifiques de la recherche fondamentale et appliquée:collection de papiers scientifiques «ΛΌГOΣ» avec des matériaux de la conférence scientifique et pratique internationale (Vol. 1), 30 octobre, 2020. Strasbourg, République française:Plateforme scientifique européenne.- c.72-79.https://doi.org/10.36074/30.10.2020.v1.23.

5.P. Stetsenko, G. Khalimov Blockchain-based protocol for ensuring authenticity of data origin in cloud environments, The IX International Scientific and Practical Conference “Information Control Systems &Technologies (ICST-2020)” 24 of September – 26 of September 2020 Odessa.

6.G. Khalimov, Y. Kotukh MST3 cryptosystem based on a generalized Suzuki 2 – groups, The IX International Scientific and Practical Conference “Information Control Systems &Technologies (ICST-2020)” 24 of September – 26 of September 2020 Odessa.

7.Oleksii Nariezhnii, Tetiana Grinenko, Maksym Trotsko, Oleksandr Kostyria. Synchronization of High-Speed Quantum Random Number Generators via Digital Television Channels. International Scientific-Practical Conference “Problems of Infocommunications. Science and Technology” (PIC S&T′2020), Kharkiv, Ukraine. Scopus.

8.Perepadia V., Lysko V., Zabolotnyj V., Features of Analytical Estimation Methodology of the Compromising Emanations Level of the Test Signal Harmonics of a Personal Electronic Computer Videotract, International Scientific and Practical Conference “Problems of Infocommunications. Science and Technology” (PIC S&T′2020),and Practical Conference

9.Victor Ruzhentsev, Roman Levchenko and Oleksandr Fediushyn Cryptanalysis of simple Substitution-Permutation Cipher using Artificial Neural Network International Scientific-Practical Conference “Problems of Infocommunications. Science and Technology” (PIC S&T′2020), Kharkiv, Ukraine. Scopus.

10.G. Khalimov, I. Didmanidze, Y. Kotukh, O. Sievierinov, O. Shonia, Encryption scheme based on the automorphism group of the Suzuki function field “Problems of Infocommunications. Science and Technology” (PIC S&T′2020), Kharkiv, Ukraine. Scopus.

11.Vitalii Martovytskyi, Igor Ruban, Oleksandr Sievierinov, Andrii Nosyk and Valentyn Lebediev Mathematical Model of User Behavior in Computer Systems “Problems of Infocommunications. Science and Technology” (PIC S&T′2020), Kharkiv, Ukraine. Scopus.

Prepared for publication in international publications:

1.A. Kuznetsov, I. Oleshko, V. Krasnobaev. Building of fault-free computer system, which functioning in residual classes. Acta Polytechnica. Prague. – ISSN 18052363.

2.A. Kuznetsov , I. Oleshko, V. Tymchenko ,K. Lisitsky ,M. Rodinko , A. Kolhatin. Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain. International Journal of Computer Network and Information Security(IJCNIS). – MECS Press.

3.G. Khalimov, Y. Kotukh. Encryption scheme based on the automorphism group of the Ree function field, The 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2020) Paris, France. December 14-16, 2020.

Round table at the Department of Information Technology Security

 

Round table at the Department of Information Technology SecurityRound table at the Department of Information Technology SecurityRound table at the Department of Information Technology Security
Round table at the Department of Information Technology SecurityRound table at the Department of Information Technology SecurityRound table at the Department of Information Technology Security