Кафедра комп'ютерної радіоінженерії та систем технологічного захисту (КРіСТЗІ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кафедра комп'ютерної радіоінженерії та систем технологічного захисту (КРіСТЗІ) за назвою
Зараз показано 1 - 20 з 139
Результатів на сторінку
Варіанти сортування
Публікація About the possibilities of the electric echo use for the technical information security tasks(ХНУРЕ, 2023) Ovcharenko, D. R.; Khizhnyak, P. P.Публікація Examining the influence of static application security testing on the overall security of web applications(ХНУРЕ, 2023) Еленгаупт, В. В.With the exponential growth of the internet and the rising reliance on web applications, ensuring their security has become a critical concern for organizations and individuals alike. Web applications are often vulnerable to a range of cyber threats, including data breaches, unauthorized access, and other malicious activities. In this context, Static Application Security Testing (SAST) has emerged as a crucial technique for strengthening web application security by identifying and mitigating potential vulnerabilities during the development stage.Публікація Measuring signal for electric echo analysis for the technical information security tasks(ХНУРЕ, 2023) Ovcharenko, D. R.; Zakhanskaya, V. E.Публікація Prospects for resumption of the meteor research on the balakliia geophysical complex(ХНУРЕ, 2023) Ovcharenko, K. S.In recent years, studies of meteor trails, that remain after the destruction of cosmic particles in the Earth's atmosphere, have become increasingly popular. The number of countries participating in meteor research programs is constantly growing. Ukraine also has the necessary facilities for such research. These are two meteor radars located on the territory of the Balakliia geophysical complex of the Kharkiv National University of Radio Electronics. However, at the moment the equipment is outdated, badly worn out and requires repair and modernization. This work is devoted to assessing the prospects for resuming meteor research at the Balakliia geophysical complexПублікація Starlink як перспектива розвитку технологій зв’язку міліметрового діапазону хвиль (ММДХ)(ХНУРЕ, 2023) Чигірьов, І. М.The report provides an assessment of the prospects for the development of millimeter range communication systems based on the broadband satellite communication system - STARLINK. The technical characteristics of the modern communication system are considered: system architecture; technical characteristics of satellites (number of satellites and parameters of their orbits, prospects and ways of further development of technologies). It is emphasized that for the current state of relations between Ukraine and the Russian Federation with aggression from Russia, it is very important for Ukraine to have reliable broadband access to the network for coordination of units of the Armed Forces of Ukraine and communication between them.Публікація The practical electrical echo measurement for the technical information security tasks(ХНУРЕ, 2023) Ovcharenko, D. R.; Solyanyk, I. A.Публікація UBA-аналіз як засіб підвищення інформаційної безпеки автоматизованих систем(ХНУРЕ, 2023) Грицаненко, Я. Ю.The principles of UBA-analytics operation are considered, as well as tasks that UBA-systems should solve to ensure information security in automated of military automated systems.Публікація Авторське право на комп’ютерну програму(ХНУРЕ, 2022) Леушина, А. А.; Олейнікова, О. І.This report examines the terms and object of copyright. Inform about an efficient way of protecting a computer program. The theses is exploring benefits of intellectual property protectionПублікація Акустоелектричні канали витоку інформації(ХНУРЕ, 2023) Павленко, Я. С.Acoustoelectric transducers are widely used in various applications, including data communication, sensing, and imaging systems. Acoustoelectric transducers convert electrical signals to acoustic waves and vice versa, making them vulnerable to technical channels of information leakage. Countermeasures to prevent information leakage through acoustoelectric transducers include physical isolation, shielding, and filtering techniques. A comprehensive understanding of the technical channels of information leakage in acoustoelectric transducers is crucial for the design and implementation of secure systems.Публікація Анализ потенциально опасных источников ПЭМИ в средствах вычислительной техники(ХНУРЭ, 2012) Сягаева, О. А.The most dangerous channels of information leakage in information systems is a side electromagnetic radiation (compromising emanations), created by the technical devices such as personal computers, and communication lines. The analysis revealed that the most dangerous devices of computer technology in terms of information leakage by compromising emanations are PC monitors, keyboards and printersПублікація Аналіз алгоритмів пошуку в структурі даних для створення зручного механізму опитування користувачів мереж(ХНУРЕ, 2020) Абраменко, P. O.Undoubtedly, classification is the basic process in human intellectual activity. When we encounter a new phenomenon, we try to find an analogue in the field known to us. Considering a group of any objects, we involuntarily divide them into subgroups of closely related elements. Classification is present in the ordering of facts, phenomena and objects known to us. Based on the above, we can conclude that classification is a fundamental concept of science and practice.Публікація Аналіз впливу вузькосмугової завади на завадостійкість ШПС(ХНУРЕ, 2023) Чередніченко, О. Р.Theses are about the problems of receiving wideband signals under interferences. There is narrowband interference that can have sufficient impact on wideband signal. It is difficult to analyze this impact without computer modeling. The model was created in MATLAB software system. Some experiments have been done to analyze the impact of different parts of receiver on the error probability when receiving wideband signal under narrowband harmonic interferenceПублікація Аналіз захищеності інформації в бездротовій мережі lorawan(ХНУРЕ, 2019) Болінова, М. М.This article is devoted to the importance of data security in the LoRaWAN network. This report describes the principles of encrypting session keys using the AES algorithm, over-the-air activation and activation by personalization.Публікація Антена на основі фракталу Коха(ХНУРЕ, 2023) Сердюк, С. Л.With the development of telecommunications technologies, there are requirements for more compact and modernized antennas. This work is devoted to the study of the antenna based on the Koch fractal. Advantages and examples of using the antenna based on the Koch fractal are given.Публікація Використання DTW-алгоритму в задачі ідентифікації користувачів за клавіатурним почерком(ХНУРЕ, 2023) Леушина, А. А.The algorithm of keystroke authentication based on the DTW algorithm is developed. The algorithms of formation of the user profile and its authentication has been designed.Публікація Виявлення закладних пристроїв на об’єктах інформаційної діяльності(ХНУРЕ, 2023) Духанін, Г. А.This work is devoted to the detection of embedded devices at the objects of information activities.Embedded devices are detected in the course of complex special checks at the objects of information activity. Comprehensive special checks are divided into three main stages. The first stage of the verification will be the preparatory stage. At the second stage, a direct check is carried out at the facility. The end of the test is the final stage.Публікація Вплив висот антен на енергоефективність канала зв’язку(ХНУРЕ, 2023) Савенко, С. О.This work is devoted to assessing the effect of antenna heights on the desired radiated signal power while maintaining the range of the communication channel. The optimal choice of antenna height for increasing the efficiency of communication systems and reducing power consumption is considered. The Okumura-Khata model was used as the basis of the calculation. The obtained results make it possible to estimate the energy efficiency of the communication system that can be obtained by changing the height of the antennas. We studied the optimal value of the antenna mast, which minimizes the total costs for the construction of such a channel and its further operation.Публікація Вразливості мереж мобільного зв'язку на основі протоколу SS7(ХНУРЕ, 2019) Барсук, А. Т.SS7 hack is the process of getting calls or sms for a subscriber, getting on another mobile number or in an application. These days many applications uses confirmation of a user identity from sms or voice call. . If some how call and sms routed to another number then its possible to hack. In this ss7 hack tutorial, the ss7 protocol and call flows will be explained.Публікація Дводіапазонна друкована антена для сучасних систем бездротового зв'язку. Частина 1: Розробка конструкції(ХНУРЕ, 2023) Желанов, О. О.The purpose of the work is the design of a compact dual-band antenna for mobile communication systemsПублікація Дводіапазонна друкована антена для сучасних систем бездротового зв'язку. Частина 2: Параметричне дослідження(ХНУРЕ, 2023) Желанов, О. О.The purpose of the work is the study of a compact dual-band antenna for mobile communication systems.