Кафедра комп'ютерної радіоінженерії та систем технологічного захисту (КРіСТЗІ)
Постійний URI для цієї колекції
Перегляд
Останні подання
Публікація Методи пошуку прихованих відекамер(ХНУРЕ, 2025) Грабар, М. В.In today's world, preserving confidentiality is becoming increasingly important. As technology advances, the possibility of unauthorized surveillance of individuals grows, creating additional risks. Hidden video cameras can be used for legal purposes, such as security, as well as for intruding into citizens' private lives. Detecting such devices is an essential skill that helps protect personal safe ty and prevent the leakage of confidential information. The theses examine the methods and algorithms for detecting concealed camera installations.Публікація Методи та засоби захисту акустооптичного каналу від витоку інформації на об'єкті інформаційної діяльності(ХНУРЕ, 2025) Іванько, І. К.This report briefly describes the methods and means of protecting the acousto-optic information channel to the object of information activity.Публікація Тестування безпеки бездротових мереж у середовищі Kali Linux(ХНУРЕ, 2025) Кияниця, О. М.; Холодило, О. В.This paper investigates the security of wireless networks using the Kali Linux software environment. Cracking networks involves several stages, with success depending on the speed of key decryption–the most labor-intensive phase. The advantage of Kali Linux lies in its extensive set of tools for vulnerability analysis and ethical hacking.Публікація Система нічного бачення на базі відеокамер Hikvision(ХНУРЕ, 2025) Медведєв, Є. О.; Михайлов, Д. О.The report is dedicated to the integration of video surveillance cameras as a night vision system in military vehicles. Traditional lighting, particularly head lights, can reveal the vehicle's location, creating a risk for the crew during com bat operations. Specialized night vision systems are expensive and not widely available, and standard devices have limitations, such as strong glare and low range. The use of cameras, such as Hikvision models, provides a modern, cost effective, and efficient solution that enables combat operations under limited visibility conditions without using visible light.Публікація Захист мереж доступу на базі технології Wi-Fi(ХНУРЕ, 2025) Сливар, У. М.This work enhances Wi-Fi security by adding two-factor authentication with Google Authenticator. A one-time password (OTP) changes every minute, preventing brute-force and WPS attacks. Testing confirms improved protection against unauthorized access.Публікація Захист інформації від зняття лазерними системами акустичної розвідки(ХНУРЕ, 2025) Степуро, О. В.One of the current channels of speech information leakage today is the optical-electronic technical channel. The work examines existing and promising passive and active methods of protecting acoustic information from leakage via the optical-electronic channel, in particular from interception by laser acoustic reconnaissance systemsПублікація Browser security: threats, multi-factor authentication, and advanced protection mechanisms(ХНУРЕ, 2025) Khyzhniak, M. А.This work provides an overview of key cybersecurity threats related to web browsers and the role of multi-factor authentication (MFA) in enhancing security. It examines threats such as phishing attacks, malware, man-in-the-middle (MITM) attacks, and malicious browser extensions. Special attention is given to the development of MFA and its impact on browser security, with a focus on modern authentication standards like WebAuthn and FIDO2, highlighting their advantages over traditional security methods [1, 2] and the need for widespread implementation of MFA.Публікація Перехоплення побічних електромагнітних випромінювань персональних комп'ютерів, що використовують цифрові інтерфейси(ХНУРЕ, 2025) Санжарова, А. К.This work is devoted to analyzing the threats of intercepting side electromagnetic emissions (SEME) from personal computers that use digital video interfaces. The mechanisms of SEME formation and their impact on the security of displayed information are examined. Special attention is paid to methods of image reconstruction based on intercepted signals and to the factors affecting text readability.Публікація Виявлення радіоакустичних закладних пристроїв методом радіомоніторингу на об'єкті інформаційної діяльності(ХНУРЕ, 2025) Скурятін, О. В.This report explores the main characteristics of radio-acoustic eavesdrop ping devices, their types, and classification. It examines their design features and operational frequency ranges, as well as methods of information transmission and signal encoding. The report also analyzes and discusses modern radio monitoring techniques used to detect them. Special attention is given to the effective ness of different detection methods and the importance of ensuring information securityПублікація Problems of using ai-generated images and an overview of possible solutions(ХНУРЕ, 2025) Perederii, I. А.With the development of image generation technologies based on artificial intelligence (AI), the possibilities of automated creation of visual content are significantly expanding. In addition, new ethical and legal challenges arise, such as issues of copyright, transparency of learning algorithms, and responsibility for the use of generated content. Special attention should be paid to issues of cyber security, in particular, prevention of misuse in the field of digital identification and protection of personal data. This work analyzes the key stages of image generation development using AI, current challenges, and possible ways to overcome them.Публікація Загроза використання ші при перехопленні ПЕМВ монітора(ХНУРЕ, 2025) Попова, А. О.; Ярмола, А. В.This study explores the use of artificial intelligence to detect and analyze electromagnetic emissions (EME) from monitors. By applying deep learning techniques, the proposed approach improves image reconstruction accuracy, helping to identify threats and reduce the risk of information leakage. Experimental results show significant improvements in detecting and restoring screen images from EME signals. The research also considers countermeasures and ways to minimize the risks associated with such attacks.Публікація Методи геолокації користувачів смартфонів(2025) Мосієвич, К. Д.This study examines a hybrid approach to geolocation that combines GPS, Wi-Fi, cell tower signals, and seismic vibrations to improve accuracy in a variety of environments. The proposed method dynamically adjusts the weighting factors for each technology, reducing the positioning error. Experimental results show an accuracy improvement of 40% in urban environments and 30% in indoor environments compared to traditional methods. Further research will focus on improving algorithms for indoor navigation and increasing the energy efficiency of geolocation systems.Публікація Дослідження ефективності ідентифікації особи за термограмою обличчя. Частина 1(2025) Канарик, А. В.; Терновий, Я. І.Using the databases "SF-TL54", "Visible Thermal DataSet" and Orange software, a study of the accuracy of facial thermogram identification in nonlaboratory conditions was conducted. The results obtained allow us to recommend the use of video cameras with built-in thermal imaging in access control and management systems in order to increase the accuracy of user identification.Публікація Дослідження ефективності ідентифікації особи за термограмою обличчя. Частина 2(ХНУРЕ, 2025) Канарик, А. В.; Терновий, Я. І.Using the databases "SF-TL54", "Visible Thermal DataSet" and Orange software, a study of the accuracy of facial thermogram identification in nonlaboratory conditions was conducted. The results obtained allow us to recommend the use of video cameras with built-in thermal imaging in access control and management systems in order to increase the accuracy of user identification.Публікація Система охоронної сигналізації на базі Wi-Fi сканера(ХНУРЕ, 2025) Когогін, Я. М.This work investigates the principle of operation of a Wi-Fi module in monitoring mode, the creation of a system that responds to malicious devices in the field of operation of such a sensor, and notifies about a threat. The result of the operation of system is the detection of devices, the comparison of their MAC address in the database and, in the absence of this device, the activation of the notification systemПублікація Застосування інтелектуального аналізу текстів для вирішення задач інформаційної безпеки. Частина 1. Захист від фішингу(ХНУРЕ, 2025) Панков, Д. С.; Машура, А. П.An algorithm for building a spam filter to detect phishing attacks is proposed. The accuracy of classification of emails from the "Shuhaib-Ahamed Dataset" was studied in the Orange software environment. The accuracy of detecting texts containing phishing features was 98.5 % when using the fast Text ex tractor and a neural network as a classifier. The proposed algorithm can be used in addition to the spam/phishing filter built into the email client or as an add-on to a DLP system to prevent the spread of phishing messages through the corporate network due to staff negligence or insider activity.Публікація Застосування інтелектуального аналізу текстів для вирішення задач інформаційної безпеки. Частина 2. Пошук інсайдерів(ХНУРЕ, 2025) Панков, Д. С.; Машура, А. П.An algorithm for detecting insiders based on automated semantic analysis of sent emails is proposed. In the Orange software environment, based on the database "The Enron Email Dataset", a study of the possibilities of classifying the organization's personnel into insiders and ordinary employees was carried out. The accuracy of identifying insiders was 60%Публікація Застосування нейронних мереж для задач захисту інформації(ХНУРЕ, 2025) Андреас, Д. В.Modern information systems are increasingly becoming targets of cyber threats, among which DDoS attacks are of particular danger. In recent years, the number of such attacks has increased significantly, and their complexity and effectiveness have increased due to the use of botnets, automated scripts and masking algorithms.Публікація Загрози витоку акустичної інформації через волоконно-оптичні системи зв’язку(ХНУРЕ, 2025) Жовтобрюх, В. Ю.Fiber optic communication systems (FOCS) are widely used due to their high bandwidth, immunity to electromagnetic interference, and advanced security features. However, they are not completely protected from information leak age. One of the new threats is acoustic information leakage, which can occur due to external acoustic vibrations affecting the optical fiber. The paper considers the main mechanisms of such leakage, possible interception methods, and possible countermeasures.Публікація Захист освітніх електронних інформаційних ресурсів(ХНУРЕ, 2025) Савенко, С. О.The work examines electronic information resources (EIR) intended for use in the educational process. The specified types and advantages of educational EIRs, requirements and recommendations for their use. The main threats to educational EIRs and areas of protection are formulated: organizational, technical, legal. The essence of EIR determines the specificity of their protection.