Кафедра комп'ютерної радіоінженерії та систем технологічного захисту (КРіСТЗІ)
Постійний URI для цієї колекції
Перегляд
Перегляд Кафедра комп'ютерної радіоінженерії та систем технологічного захисту (КРіСТЗІ) за назвою
Зараз показано 1 - 20 з 219
Результатів на сторінку
Варіанти сортування
Публікація About the meteor radar modeling problem(ХНУРЕ, 2024) Ovcharenko, K. S.The work examines the prospects of not only recovery, but also simultaneous modernization of meteor radars, which are situated in Balakliia Geophysical Complex. They were created in the 70-80s and are now morally and physically obsolete. It seems inevitable that some parameters of meteor radars will change during modernization. The influence of these parameters on the capabilities of meteor radars is considered. The necessity of using mathematical modeling before the meteor radars modernization “in hardware” is substantiated.Публікація About the possibilities of the electric echo use for the technical information security tasks(ХНУРЕ, 2023) Ovcharenko, D. R.; Khizhnyak, P. P.Публікація Analysis of the practical measurement of electrical echo parameters in mobile communications(ХНУРЕ, 2024) Ovcharenko, D. R.The results of practical measurements of echo signal delays during calls in the networks of mobile operators in Ukraine are presented. It is shown that with the help of electrical echo, facts of call redirection to the network of another operator can be detected, since the echo delay increases. It has been established that the use of a roaming SIM card will not allow simulating a stay in another country if it is registered in the network of the national telecom operator. The use of IP telephony when calling to mobile networks is also clearly determined by the echo delay.Публікація Comparative research of options for obtaining ECPS(ХНУРЕ, 2024) Bondarenko, A. A.This paper will consider the theoretical basis of digital signatures and certificates and analyze various ways of obtaining electronic digital signatures (EDS) in Ukraine. In addition, the currently available formats of electronic signatures and EDS providers will be considered.Публікація Current cyber security trends of bank accounts and bank buildings(ХНУРЕ, 2024) Bulaga, V. A.; Perederii, I. A.This work is dedicated to the importance of financial security of the banking system of Ukraine and conducting a comprehensive assessment of the current situation. An analysis of the protection and insecurity of the current bank was carried out. The technical details of the bank's security system have been reviewed. Cybersecurity of banking and banking sectors is an important part of our economy. However, cyber-attacks are becoming increasingly sophisticated, and banks are at risk of losing their efforts to protect the data of their clients. By keeping up to date with the latest security technologies and best practices, banks can continue to provide their clients with safe and reliable banking services.Публікація DDoS -атаки та їх ознаки у безпровідних wi-fi мережах(ХНУРЕ, 2024) Варейчук, В. Е.DDoS attacks are one of the most common and dangerous attacks on a Wi Fi network. Protection systems against them are quite cumbersome and expensive, which only the largest corporations can afford. In order to detect a DDoS attack and not resort to full network monitoring and check all received packets, since detecting this type of attack is quite simple using signs that can be seen without using special equipment and specialized programs. The ability to use the command line and view the Internet interface of the router is enough.Публікація Detection of noise-like signals by the features of their spectra(ХНУРЕ, 2024) Nikitin, A. N.This work is about improving the energy detection method for noise-like signal detection by changing the approach to signal processing in the integrator in order to increase the speed of isolating the useful signal from the noise. In essence, a new method is proposed for detecting on a noise background, using the symmetry of the spectrum of NLS. The detection process was simulated. It showed the effectiveness of the proposed method in comparison with simple energy detection.Публікація Ensuring information security in software systems through preliminary static code analysis(ХНУРЕ, 2024) Elenhaupt, V. V.This work is about developing a static code analyzer for the Crystal programming language to identify and prevent potential vulnerabilities. Crystal is a young and promising programming language that offers modern tools for creating reliable software. In this work, we look at how static analysis can help identify and fix weaknesses in code that could lead to information leaks, encryption vulnerabilities, and other potential security issues.Публікація Examining the influence of static application security testing on the overall security of web applications(ХНУРЕ, 2023) Еленгаупт, В. В.With the exponential growth of the internet and the rising reliance on web applications, ensuring their security has become a critical concern for organizations and individuals alike. Web applications are often vulnerable to a range of cyber threats, including data breaches, unauthorized access, and other malicious activities. In this context, Static Application Security Testing (SAST) has emerged as a crucial technique for strengthening web application security by identifying and mitigating potential vulnerabilities during the development stage.Публікація Measuring signal for electric echo analysis for the technical information security tasks(ХНУРЕ, 2023) Ovcharenko, D. R.; Zakhanskaya, V. E.Публікація Prospects for resumption of the meteor research on the balakliia geophysical complex(ХНУРЕ, 2023) Ovcharenko, K. S.In recent years, studies of meteor trails, that remain after the destruction of cosmic particles in the Earth's atmosphere, have become increasingly popular. The number of countries participating in meteor research programs is constantly growing. Ukraine also has the necessary facilities for such research. These are two meteor radars located on the territory of the Balakliia geophysical complex of the Kharkiv National University of Radio Electronics. However, at the moment the equipment is outdated, badly worn out and requires repair and modernization. This work is devoted to assessing the prospects for resuming meteor research at the Balakliia geophysical complexПублікація Starlink як перспектива розвитку технологій зв’язку міліметрового діапазону хвиль (ММДХ)(ХНУРЕ, 2023) Чигірьов, І. М.The report provides an assessment of the prospects for the development of millimeter range communication systems based on the broadband satellite communication system - STARLINK. The technical characteristics of the modern communication system are considered: system architecture; technical characteristics of satellites (number of satellites and parameters of their orbits, prospects and ways of further development of technologies). It is emphasized that for the current state of relations between Ukraine and the Russian Federation with aggression from Russia, it is very important for Ukraine to have reliable broadband access to the network for coordination of units of the Armed Forces of Ukraine and communication between them.Публікація The electrical echo measurement under the echo cancellation activity(ХНУРЕ, 2024) Ovcharenko, D. R.This work is about to obtain an electrical echo signal for technical information security tasks in conditions when echo cancellers are active. Due to the fact that echoes are considered interference in telecommunications systems, special means, named echo cancellers, are used to suppress them. The echo cancel lersfeatures are considered, and ways to bypass them are shown. Experimental data confirming the effectiveness some of them are presented.Публікація The operation of a home solar power plant simulation to the output increase(ХНУРЕ, 2024) Veriahin, V. V.Theses are about increasing electricity output from a small solar power plant, which is installed in non-optimal conditions. For part of the day, solar panels may be in the shadow of surrounding objects. The question arises: where to place and how to orient solar panels? To answer this question, a model is proposed that performs all the necessary calculations and gives appropriate recommendations. Numerical results were also obtained for a specific situation of placing solar panels.Публікація The practical electrical echo measurement for the technical information security tasks(ХНУРЕ, 2023) Ovcharenko, D. R.; Solyanyk, I. A.Публікація UBA-аналіз як засіб підвищення інформаційної безпеки автоматизованих систем(ХНУРЕ, 2023) Грицаненко, Я. Ю.The principles of UBA-analytics operation are considered, as well as tasks that UBA-systems should solve to ensure information security in automated of military automated systems.Публікація Авторське право на комп’ютерну програму(ХНУРЕ, 2022) Леушина, А. А.; Олейнікова, О. І.This report examines the terms and object of copyright. Inform about an efficient way of protecting a computer program. The theses is exploring benefits of intellectual property protectionПублікація Акустоелектричні канали витоку інформації(ХНУРЕ, 2023) Павленко, Я. С.Acoustoelectric transducers are widely used in various applications, including data communication, sensing, and imaging systems. Acoustoelectric transducers convert electrical signals to acoustic waves and vice versa, making them vulnerable to technical channels of information leakage. Countermeasures to prevent information leakage through acoustoelectric transducers include physical isolation, shielding, and filtering techniques. A comprehensive understanding of the technical channels of information leakage in acoustoelectric transducers is crucial for the design and implementation of secure systems.Публікація Анализ алгоритмов расчета ионосферных коррекций одночастотных ГНСС наблюдений с использованием данных IGS(Weber, 2010) Бессонов, Е. А.The results of the analysis of ionospheric correction algorithms for single-frequency GNSS observations using IGS model IONEX are submitted. There are used linear and spline interpolation of discrete data. It is shown, that the linear method of interpolation of vertical ionosphere delay with the a margin error ~10 cm (RMS) is sufficient.Публікація Анализ потенциально опасных источников ПЭМИ в средствах вычислительной техники(ХНУРЭ, 2012) Сягаева, О. А.The most dangerous channels of information leakage in information systems is a side electromagnetic radiation (compromising emanations), created by the technical devices such as personal computers, and communication lines. The analysis revealed that the most dangerous devices of computer technology in terms of information leakage by compromising emanations are PC monitors, keyboards and printers