<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>October</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Cybersecurity Providing in Information and Telecommunication Systems II</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Sokolov</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Assoc.</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Borys Grinchenko Kyiv Metropolitan University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Ustimenko DSc</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Royal Holloway</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>University of London</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>United Kingdom</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tamara Radivilova DSc</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv National University of Radio Electronics</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mariya Nazarkevych DSc</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lviv Polytechnic National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>26</volume>
      <issue>2025</issue>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II),
ed. V. Sokolov, V. Ustimenko, T. Radivilova, M. Nazarkevych, Borys Grinchenko Kyiv Metropolitan
University, Kyiv, Ukraine, Oct. 26, 2025.</p>
      <p>The aim of the Cybersecurity Providing in Information and Telecommunication Systems (CPITS)
workshop is to provide a forum for researchers to discuss current trends in cybersecurity and risk
management, critical infrastructure security, wireless and sensor network privacy, IoT and IoMT
security, routing techniques for cybersecurity, cybersecurity data science, artificial intelligence,
machine learning in cybersecurity, deepfake attacks and cryptography. In CPITS, we encourage the
submission of papers in the field of cybersecurity. Novel applications of these methods to real-world
problems are welcome.</p>
      <p>There were 63 papers submitted for peer review to this workshop. Out of these, 26 papers were
accepted for this volume, 23 as regular papers and 3 as short papers.</p>
      <p>Borys Grinchenko Kyiv Metropolitan University
18/2 Bulvarno-Kudriavska str.
04053 Kyiv, Ukraine
ISSN: 1613-0073
Creative Commons License Attribution 4.0 International (CC BY 4.0)
© 2025 Cybersecurity Providing in Information and Telecommunication Systems
Editors</p>
      <p>Spatial grasp technology and its application for management of distributed systems</p>
      <p>Peter Sapaty, Anatolii Morozov, Vitalii Klymenko, Nikolay Ievlev
Intelligence versus threats: The role of AI agents in ensuring cybersecurity of
information and telecommunication systems</p>
      <p>Nikolay Ievlev, Vitalii Klymenko, Anatolii Morozov, Vitalii Yashchenko,</p>
      <p>Hennadii Hulak
Software module protecting web applications from several attacks types using
formal logic</p>
      <p>Nataliia Gulak, Sergii Ilyenko, Elena Dubchak, Andrii Maistrenko,</p>
      <p>Bohdan Zhurakovskyi
Simulation of the availability and initialization speed of a layer 2 mesh network</p>
      <p>Oleksii Dzhus, Mykhaylo Lobur
Methodology for assessing computer security levels</p>
      <p>Volodymyr Akhramovych, Vadym Akhramovych, Anna Ilyenko,</p>
      <p>Olha Kryvokulska, Viktoriia Zhebka
Machine learning methods for detecting intrusions based on network traffic
analysis</p>
      <p>Yuliia Kostiuk, Pavlo Skladannyi, Volodymyr Sokolov, Svitlana Rzaieva,</p>
      <p>Karyna Khorolska
Intelligent modeling of personalized learning in cybersecurity training</p>
      <p>Pavlo Skladannyi, Yuliia Kostiuk, Oleksii Zhyltsov, Yuriy Savchenko,</p>
      <p>Yevhen Antypin
Exponential data augmentation methods for improving YOLO performance in
computer vision tasks</p>
      <p>Yurii Myshkovskyi, Mariia Nazarkevych, Victoria Vysotska, Rostyslav Yurynets
Phase categories as a tool for modeling uncertainty in higher education programs
and program learning outcomes</p>
      <p>Hryhorii Hnatiienko, Oleg Ilarionov, Hanna Krasovska, Larysa Myrutenko,</p>
      <p>Anzhelika Tkachuk
10 AdaptiveBayes: Comprehensive empirical analysis and algorithmic enhancement
framework</p>
      <p>Sergii Kavun
11 Building specific of zero trust architecture in hybrid infrastructures</p>
      <p>Roman Syrotynskyi, Ivan Tyshyk, Аlona Desiatko
1–19
20–34
35–45
46–57
58–71
72–94
95–119
120–132
133–148
149–178
179–190
12 Layered model for protecting speech information against leakage through an
optoelectronic channel</p>
      <p>Nazarii Dzyanyi, Ivan Opirskyy, Mariia Shved, Olha Liubchyk
13 Universal security platform for intelligent cyber-physical technology of carbon
dioxide monitoring in the regional ecosystem</p>
      <p>Valerii Dudykevych, Halyna Mykytyn, Sviatoslav Borduliak, Yaroslav Fur
14 Pragmatic DDoS detection on AWS cloud with lightweight machine learning</p>
      <p>Vitalii Molnar, Dmytro Sabodashko
15 A security system with automated person identification based on computer vision
technologies</p>
      <p>Bohdan Zhurakovskyi, Viktor Shutenko, Anatoliy Makarenko, Oleksandr Pliushch,</p>
      <p>Rostyslav Zakharov
16 A method of generating data for further training artificial intelligence models 246–256
aimed at solving cybersecurity problems</p>
      <p>Ivan Chernihivskyi, Larysa Kriuchkova
191–201
202–216
217–227
228–245
17 Security difficulties and barriers in building decentralized blockchain bridges,
solution methods</p>
      <p>Andrii Bondarchuk, Viktoriia Onyshchenko, Andrii Hashko, Andrii Strazhnikov,</p>
      <p>Nataliia Korshun
18 Privacy-preserving security operations: Bridging the conformance gap between
SOC efficiency and GDPR compliance</p>
      <p>Maksim Iavich, Giorgi Iashvili
19 Security methods in .NET technology</p>
      <p>Serhii Buchyk, Serhii Toliupa, Oleksandr Buchyk, Anastasiia Shabanova
20 Research on a new hybrid random number sequence generator</p>
      <p>Serhii Yanushevskyi, Heorhii Prokhorov, Oleksandr Hres, Yurii Yaremchuk,</p>
      <p>Volodymyr Lytvynenko
21 Model of an intelligent decision support system to ensure cyber resilience of
military information systems</p>
      <p>Olena Nehodenko, Svitlana Shevchenko, Vitalii Nehodenko, Yuliia Zhdanova
22 Technological process management for cloud-based critical infrastructure under
emerging threats and challenges</p>
      <p>Tetiana Smirnova, Oleksandr Dobrynchuk
23 Formation of a conceptual model for cyber-physical monitoring of critical
infrastructure environmental objects</p>
      <p>Vadym Chytulian, Andrii Kolodiuk, Ivan Oleinikov, Viktoriia Zhebka,
Valeriia Balatska
257–274
274–283
284–294
295–305
306–315
316–328
329–340
Short Papers
348–356
357–364</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>On the stream ciphers based on the hidden algebraic graphs Vasyl Ustimenko</article-title>
          , Oleksandr Pustovit,
          <source>Tymofii Svyrydenko 341-347</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>