ISSN: 2310-8061
Репозиторій Харківського національного університету радіоелектроніки «ElAr КhNURE» є електронною платформою, що містить публікації наукових праць та досліджень науково-педагогічних працівників, інших співробітників, здобувачів вищої освіти ХНУРЕ. Серед них монографії, статті з наукових журналів та збірників, матеріали науково-практичних заходів, наукові публікації (розміщуються за умови наявності рецензії наукового керівника) та кваліфікаційні роботи здобувачів вищої освіти (розміщуються за дозволом автора КвР).
З усіх питань звертатися до адміністратора ElAr KhNURE за адресою: yuliia.derevianko@nure.ua

Фонди
Виберіть фонд, щоб переглянути його колекції.
Останні подання
Reliability-Based Post-Quantum Digital Signature on Multi-Parametric Groups
(ХНУРЕ, 2025) Khivrenko, H. O.
This paper addresses reliability and safety assurance for computer and information systems threatened by future quantum adversaries [5]. We outline a digital signature scheme over non-commutative multi-parametric groups (NMPGs) whose hardness relies on simultaneous conjugacy/decomposition problems rather than integer or
lattice structures. The design is reliability-first: deterministic signing (to avoid RNG induced failures), constant-time word- reduction kernels, explicit verification equations with localizable failure, and built-in assurance artifacts (known-answer tests, power-on self-tests, duplication checks, and fault handling aligned with FMEA). Parameter agility enables uplift without key-format churn, supporting long-lived deployments. While complementary to NIST-standardized PQC (and therefore useful for crypto-diversity), the proposal emphasizes engineering properties important in safety-critical contexts: predictable worst-case execution time, side-channel resilience practices, and evidence-friendly testing for certification.
Investigating Leakage from Spurious Emissions via Accidental Electric Antennas
(ХНУРЕ, 2025) Kustov, A. K.; Zabolotnyi, V. I.
Ensuring the information security of electronic computing equipment is a critical task for technical protection complexes. A significant threat is posed by spurious electromagnetic emissions. While previous research focused on the magnetic field component's re-radiation, the channel formed by the electric field remains understudied. This report aims to build a quantitative model of this leakage channel, where the electric field from main technical equipment induces a signal in a conductor acting as an accidental antenna formed by auxiliary systems. The study covers induction, re- radiation, and their impact on the hazardous zone. The proposed quantitative approach shows that ignoring this channel can lead to an underestimation of the hazardous zone's radius by fifty percent or more. The results prove the necessity of a comprehensive analysis of both electromagnetic field components for an adequate threat assessment and the implementation of more effective security methods.
Automated Detection of Forgeries in Documents Using Segmentation Neural Networks
(ХНУРЕ, 2025) Lohvynenko, S. R.; Prosolov, V. V.
This paper presents a neural network–based approach for automated detection of forged areas in PDF documents. The method converts document pages into image representations and applies semantic segmentation to localize manipulations such as inserted signatures or replaced text. U-Net and DeepLabV3+ architectures were trained on a dataset of authentic and synthetically forged samples. Experimental results show that segmentation models achieve high accuracy (IoU ≈ 0.91), outperforming traditional metadata-based techniques. The proposed solution can be integrated into electronic document management and cybersecurity systems for automated authenticity verification.
A Model for Assessing the Level of Multi-Parameter Threats Using the Mamdani Fuzzy Logic Algorithm
(2025) Petrenko, O. Y.; Petrenko, O. S.; Ostrovskyi, Z. N.
This paper introduces a model for assessing threats and prioritizing them on a scale from 0 to 1 by utilizing fuzzy logic methods, which ensure high accuracy of results. The model is developed using the first type Mamdani algorithm. The proposed threat assessment model has been tested in both static and dynamic real-time attack scenarios. The implementation relies on fuzzy logic methods, with system modeling carried out using the MATLAB Fuzzy Logic Toolbox. This toolbox provides tools for designing systems based on fuzzy logic principles. The introduced threat prioritization procedure, constructed on the fuzzy set model, significantly enhances functionality by enabling accurate determination of threat levels. This procedure forms a solid foundation for making well-informed decisions regarding measures to counter these threats.
Protocol for Applying an Integrity-Assurance System Using Shortened Codes
(2025) Sydorenko, Z. M.; Sievierinov, O. V.
The paper examines a protocol for implementing a data integrity assurance system for the Industrial Internet of Things (IIoT) based on shortened Goppa codes. The main integrity threats in IIoT are analyzed, and it is shown that the presence of a cryptographic algorithm alone, without a proper protocol, does not guarantee the secure operation of the system. The use of a block-chaining protocol with the assignment of unique identifiers (UIDs) and timestamps is proposed to detect message replays and delays. A block- chaining encoding mechanism is described, which significantly reduces the likelihood that an attacker can form a valid codeword with a required UID. It is demonstrated that such a protocol minimizes risks associated with the linearity of shortened codes and provides an additional layer of protection, provided the Goppa polynomial key remains undisclosed.