<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>CEUR Workshop Proceedings</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cybersecurity Providing in Information and Telecommunication Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Sokolov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Assoc.</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Borys Grinchenko Kyiv Metropolitan University</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko DSc</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Royal Holloway</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>University of London</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tamara Radivilova DSc</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv National University of Radio Electronics</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariya Nazarkevych DSc</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lviv Polytechnic National University</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cybersecurity in Intelligent Transport Systems: Current Challenges and Solutions Iryna Mashkina</institution>
          ,
          <addr-line>Svitlana Rzaieva, Yuliia Kostiuk, Nataliia Mazur, Zoreslava Brzhevska</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>5</fpage>
      <lpage>11</lpage>
      <kwd-group>
        <kwd>in Information</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS), ed.
V. Sokolov, V. Ustimenko, T. Radivilova, M. Nazarkevych, Borys Grinchenko Kyiv Metropolitan
University, Kyiv, Ukraine, Feb. 28, 2025.</p>
      <p>The aim of the Cybersecurity Providing in Information and Telecommunication Systems (CPITS)
workshop is to provide a forum for researchers to discuss current trends in cybersecurity and risk
management, critical infrastructure security, wireless and sensor network privacy, IoT and IoMT
security, routing techniques for cybersecurity, cybersecurity data science, artificial intelligence,
machine learning in cybersecurity, deepfake attacks and cryptography. In CPITS, we encourage the
submission of papers in the field of cybersecurity. Novel applications of these methods to real-world
problems are welcome.</p>
      <p>There were 82 papers submitted for peer review to this workshop. Out of these, 46 papers were
accepted for this volume, 38 as regular papers and 8 as short papers.</p>
      <p>Borys Grinchenko Kyiv Metropolitan University
18/2 Bulvarno-Kudriavska str.
04053 Kyiv, Ukraine
CEUR Workshop Proceedings
ISSN: 1613-0073
Creative Commons License Attribution 4.0 International (CC BY 4.0)
© 2025 Cybersecurity Providing in Information and Telecommunication Systems
Editors
Optimal Cybersecurity Management: Global Controllability of Linear Models</p>
      <p>Mariia Astafieva, Nataliya Stepanenko
Cyber Evidence Software as the Digital Forensics Tools in the Investigation of
Cybercrime</p>
      <p>Vladyslav Bilous, Dmytro Bodnenko, Oleksandra Lokaziuk, Pavlo Skladannyi,</p>
      <p>Vadym Abramov
Development of a Biometric Electronic Signature based on Iris Features</p>
      <p>Nazar Oleksiv, Mariia Nazarkevych
Enterprise Kubernetes Method Modification at S&amp;P 500 Companies</p>
      <p>Oleh Faizulin, Mariia Nazarkevych
Organizing Web Accessibility and Security in the Open University Ecosystem</p>
      <p>Oksana Buinytska, Iryna Kovalenko, Valeriia Smirnova, Bohdan Hrytseliak
Numeric Fields in Database Development: From Optimal Design to Secure
Coding—SQL Attacks Protection Method</p>
      <p>Yaroslava Momryk, Dmytro Sabodashko
Stability of Users’ Handwritten Signature Characteristics for Cybersecurity
Purposes</p>
      <p>Ivan Horniichuk, Ihor Subach, Artem Mykytiuk, Vitalii Fesokha, Nadiia Fesokha
Hybrid Model for Detecting Fraudulent Domain Names</p>
      <p>Serhii Buchyk, Anastasiia Shabanova, Oleksandr Buchyk, Viktoriia Shmatko,</p>
      <p>Maksym Kotov
10 Byzantine Fault Tolerance in Distributed Systems: Advancing the Replica State
Discovery Protocol v2.0</p>
      <p>Maksym Kotov, Serhii Toliupa, Volodymyr Nakonechnyi, Serhii Buchyk,</p>
      <p>Oleksandr Buchyk
11 Research on Policy-as-Code for Implementation of Role-based and Attribute-based
Access Control</p>
      <p>Oleksandr Vakhula, Ivan Opirskyy, Pavlo Vorobets, Orest Bobko, Oleh Kulinich
12 Module for Detecting and Analyzing Cyber Threats in Information and
Communication Systems of Civil Aviation Facilities</p>
      <p>Anna Ilyenko, Sergiy Gnatyuk, Sergii Ilyenko, Olena Prokopenko,
Valentyna Teliushchenko
1–13
14–25
26–37
38–55
56–69
70–83
84–96
97–109
110–120
121–138
139–157
158–172
13 SLAM in Navigation Systems of Autonomous Mobile Robots</p>
      <p>Liudmyla Hanenko, Kamila Storchak, Svitlana Shlianchak, Maksym Vorohob,</p>
      <p>Mylana Pitaichuk
14 Machine Learning-based Environmental Monitoring and Analysis System</p>
      <p>Bohdan Zhurakovskyi, Oleksandr Pliushch, Volodymyr Saiko, Viktor Shutenko
15 Honeypot-based Ransomware Detection as a Component of Security Posture
Monitoring in Zero Trust Architecture</p>
      <p>Danyil Zhuravchak, Pavlo Hlushchenko, Valerii Dudykevych
16 Application of LLM for Assessing the Effectiveness and Potential Risks of the
Information Classification System According to SOC 2 Type II</p>
      <p>Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Anatoliy Obshta
17 Data Privacy and Security Challenges in Mobile Application Analytics Frameworks</p>
      <p>Taras Fedynyshyn, Olha Partyka
18 Analysis of Digital Tools for Educational Quality Assessment at the University</p>
      <p>Oksana Buinytska, Bohdan Hrytseliak, Valeriia Smirnova, Anastasiia Tiutiunnyk
19 Research of the Centralized Configuration Repository Efficiency for Secure Cloud
Service Infrastructure Management</p>
      <p>Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Vyacheslav Cherevyk,</p>
      <p>Nadiia Dovzhenko
20 Architectural Patterns for Smart Contract Development in Access Control for
Decentralized Databases</p>
      <p>Petro Petriv, Andrian Piskozub
21 Method for Ensuring the Reliability and Security of Personal Data in Blockchain
Systems of State Registers</p>
      <p>Valeriia Balatska, Vasyl Poberezhnyk, Ivan Opirskyy
22 Research of Information Conflict between Humans and Artificial Intelligence in
Information and Cybernetic Systems</p>
      <p>Svitlana Shevchenko, Yuliia Zhdanova, Оlena Nehodenko, Svitlana Spasiteleva,</p>
      <p>Vitalii Nehodenko
23 Mathematical Models of the Modern Educational Space: Virtual Communication,
Processing of Natural Language Information, Normalization of Speech Signal</p>
      <p>Ravshanbek Zulunov, Hryhorii Hnatiienko, Vladyslavi Hnatiienko,</p>
      <p>Larysa Myrutenko
24 Directions of Two-Symbol Encoding Application in Information and Cyber
Security
173–182
183–203
204–214
215–232
233–247
248–258
260–274
275–292
293–310
311–322
323–338
339–348
25 Construction of a Stable System of Interaction of IoT Devices in a Smart Home
using a Generator of Pseudorandom Numbers</p>
      <p>Svitlana Poperehnyak, Oleh Bakaiev, Yurii Shevchuk
26 Enhancing Pseudorandom Number Generation using Environmental Sensor-based
Entropy Sources</p>
      <p>Svitlana Poperehnyak, Ihor Syvachenko, Yurii Shevchuk
27 Random-Bit-Sequence Generator based on the Fundamental Physical Process for
Secure Wideband Communication Links</p>
      <p>Ihor Koriakov, Oleksandr Pliushch, Maryan Kyryk, Bohdan Zhurakovskyi,
Serhii Toliupa
349–362
363–380
381–391
425–436
449–462
481–491
492–506
507–523
28 A Method for Biometric Coding of Speech Signals based on Adaptive Empirical 392–404
Wavelet Transform</p>
      <p>Oleksandr Lavrynenko, Maksym Zaliskyi, Denys Bakhtiiarov, Anatolii Taranenko,</p>
      <p>Yevhen Gabrousenko
29 On Symbolic Computations over Arbitrary Commutative Rings via Temporal Jor- 405–424
dan-Gauss Graphs and Multivariate Cryptosystems</p>
      <p>Vasyl Ustimenko, Oleksandr Pustovit
30 Time Multipliers in Project Effectiveness Models for Ensuring the Survivability of
Information Systems</p>
      <p>Yuriy Syvytsky, Viktor Shevchenko
31 Dynamic Models of Multi-Profile Resource Provision of Information System Pro- 437–448
tection and Survivability</p>
      <p>Yevhen Derevianko, Stanislav Denysyuk, Viktor Shevchenko
32 Spectral Characteristics of Intermodulation Emissions during High-Frequency
Imposition</p>
      <p>Larysa Kriuchkova, Ivan Tsmokanych, Nataliia Mazur, Ivan Chernihivskyi
33 A Framework for Decentralized Payment Instrument Integration with Artificial 463–480
Intelligence, Big Data, and Digital Identities</p>
      <p>Denis Virovets, Sergiy Obushnyi, Andrii Anosov, Ellana Molchanova,</p>
      <p>Karyna Khorolska
34 Adaptive Approach to Ensuring the Functional Stability of Corporate Educational
Platforms under Dynamic Cyber Threats</p>
      <p>Ihor Hanhalo, Vadym Chytulian, Zhebka Viktoriia, Bohdan Bebeshko,</p>
      <p>Karyna Khorolska
35 Methods of Personal Data Protection in Retail: Practical Solutions</p>
      <p>Svitlana Rzaieva, Dmytro Rzaiev, Nelya Mykytenko, Yurii Dreis,</p>
      <p>Viktor Grechaninov
36 Gamification and the Ontological Approach in Information Learning Systems</p>
      <p>Kostiantyn Tkachenko, Olha Tkachenko, Oleksandr Tkachenko
Short Papers
1
2
3
4
5
6
7
8</p>
      <p>Mathematical Modelling and Adaptation Strategies in the Confrontation
between Cryptocurrencies and Quantum Computers</p>
      <p>Valeriy Lakhno, Аlona Desiatko, Vitaliy Chubaievskyi, Andrii Roskladka,</p>
      <p>Serhii Kaminskyi
Taking LOLBAS Hacking to Another Level—Stealing Passwords using Built-in
Binaries</p>
      <p>Maksim Iavich, Sergiy Gnatyuk, Sergei Simonov, Viktoriia Sydorenko
Method for Reproducing the Estimation of Heterogeneous Mixtures of
Distributions based on Non-Parametric Spline for Anomaly Detection in Digital Images</p>
      <p>Anhelina Zhultynska, Pylyp Prystavka
Terahertz Range Transceiver Module for Electromagnetic Protection of Objects</p>
      <p>Gleb Avdeyenko, Teodor Narytnyk, Volodymyr Saiko, Larysa Kriuchkova,</p>
      <p>Ivan Tsmokanych</p>
      <p>VII
524–538
539–561
562–569
570–577
578–586
587–593
594–602
603–610
611–619
620–628</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>37 Effectiveness of Information Security Control using Audit Logs Yuliia Kostiuk</article-title>
          , Pavlo Skladannyi, Volodymyr Sokolov, Oleksii Zhyltsov, Yevhen Ivanichenko
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>38 Processing of Natural Language Texts in Information Learning Systems: Ontological Approach Olha Tkachenko</source>
          , Kostiantyn Tkachenko, Oleksandr Tkachenko
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>