Кафедра інфокомунікаційної інженерії (ІКІ)
Постійний URI для цієї колекції
Перегляд
Останні подання
Публікація Алгоритм оптимізації розподілу радіочастотних ресурсів у SDR-базованих LTE мережах з адаптивною просторово-часовою обробкою сигналів(ХНУРЕ, 2025) Жуга, Ю. С.This work presents a comprehensive approach to optimizing resource allocation in mobile communication systems through adaptive spatial temporal signal processing techniques. An SDR-based platform was implemented using LimeSDR and the srsRAN software suite, integrating harmonic analysis and predictive load modeling. Experimental results demonstrate significant improvements in spectral efficiency, a 30% reduction in computational load, and a 20% enhancement in energy efficiency. The proposed methodology provides high adaptability to variable traffic conditions, making it a promising solution for next generation LTE and beyond mobile networks.Публікація Розгортання базових станцій на багатосмугових вулицях з мультизв'язком всередині і між RAT з використанням міліметрових та субміліметрових хвиль(ХНУРЕ, 2025) Лютий, А. О.To mitigate the impact of disruptions caused by dynamic blockage of propagation paths in millimeter-wave (mmWave) systems, 3GPP has proposed multi-connectivity, where user equipment (UE) supports simultaneous connection to both a sub-6 GHz base station (BS) and a mmWave BS. We consider one of the most challenging prospective deployments—deployment on multi-lane streets with multi-connectivity within and between RATs.Публікація Clow-code platforms: democratizing development or creating a delayed danger(ХНУРЕ, 2025) Chaimae Michich; Kadatska, O.Low-code platforms have revolutionized software development by enabling non-technical users to build applications. However, their ease of use often bypasses traditional security safeguards, creating systemic vulnerabilities. This article analyzes security risks in low-code ecosystems, including shadow IT, insecure integrations, and compliance gaps. Using real-world case studies, we propose mitigation strategies such as centralized governance and DevSecOps integration to balance agility with security.Публікація Threats and strategies of securing the SaaS ecosystem(ХНУРЕ, 2025) Chaimae Michich; Kadatska, O.The widespread adoption of Software-as-a-Service (SaaS) platforms has transformed global collaboration, enabling seamless workflows in academia, healthcare, and enterprises. However, this shift introduces complex security challenges, ranging from inadvertent human errors to sophisticated cyberattacks. This paper explores the evolving threat landscape, analyzes systemic vulnerabilities through real-world incidents, and proposes actionable strategies to balance productivity with robust security.Публікація Відмовостійкість мереж у хмарній інфраструктурі на прикладі Oracle Cloud(ХНУРЕ, 2025) Вергелес, А. Д.Ensuring network resilience is critical for modern cloud-based business processes. Oracle Cloud Infrastructure (OCI) enhances reliability through global distribution, availability domains, fault domains, and automated scaling. Key mechanisms include data replication, traffic balancing, and self-healing systems, ensuring high availability for financial institutions and e-commerce. OCI’s architecture minimizes failures and optimizes resource management, surpassing traditional cloud solutions.Публікація Вплив процедур нормалізації голосового сигналу системи автентифікації на якість формантних даних(ХНУРЕ, 2025) Пастушенко, М. О.; Пастушенко, М. С.; Шевченко, А. О.; Файзулаєв, Т. А.The problem of increasing the security of telecommunication systems by improving the authentication system, which now widely uses biometric user attributes, is considered. From the point of view of the efficiency/cost criterion, the most promising are voice authentication systems. To reduce errors of the 1st and 2nd type in the systems under consideration and to qualitatively calculate the formant data of the user's voice signal, the influence of normalization procedures is studied. Using the example of processing the user's voice signal, the need to exclude normalization when assessing the spectrum width of individual formants is shown.Публікація Enhancing proactive vulnerability management integrating DevSecOps(ХНУРЕ, 2025) Driss Alaoui Soulimani; Kadatska, O.; Shaimae MishishThe need for robust security throughout the software development life cycle has grown with the rise in complex software ecosystems. This paper discusses the adoption of DevSecOps practices into Continuous Integration/Continuous Deployment pipelines to achieve proactive vulnerability detection and mitigation. Embedding security at every step of the SDLC, therefore, helps in minimizing risks, improving operational efficiency, and streamlining secure software delivery.Публікація Cloud security misconfigurations: risks, case studies, and infrastructure as code solutions with terraform(ХНУРЕ, 2025) Driss Alaoui Soulimani; Kadatska, O.Cloud misconfigurations are among the leading causes of security incidents in contemporary infrastructures. This article examines how misconfigurations in access controls and encryption will affect cloud security. Case studies are discussed to bring out the challenges that come with managing complex environments. The paper also discusses how Infrastructure as Code tools, including Terraform, may be leveraged to enforce robust access control and encryption policies, thus minimizing human error and enhancing security.Публікація Сучасні системи автоматизації управління мережною безпекою(ХНУРЕ, 2025) Фролов, Д. І.; Дягілєва, М. С.The dynamic threat landscape necessitates the automation of network security management (especially in telecommunications). Modern challenges include the increase in targeted attacks, stricter regulations, and the expansion of the attack surface due to network evolution. The main vendors of security management automation solutions in 5G networks are Ericsson, Nokia, and Huawei. Ericsson Security Manager provides a holistic approach. Systems from Nokia NetGuard and Huawei are its main competitors. Investments in security management automation reduce risks and financial losses.Публікація Оптимізація процесу прийняття рішень в управлінні ризиками кібербезпеки(ХНУРЕ, 2025) Фролов, Д. І.The Security Operations Center provides round-the-clock protection against attacks, necessitating the automation of malware detection and classification. The use of deep learning models allows for high accuracy in solving such tasks. Budget constraints in the SOC affect its decisions regarding the choice of tools. Using an algorithm for solving a quasi-linear constrained optimization problem helps find the necessary balance, which is an important step in the process of automating cybersecurity risk management.Публікація Дослідження підходів до візуалізації і структуризації атак у контексті моделювання дій зловмисників в інфокомунікаційній мережі(ХНУРЕ, 2025) Фукс, М. А.This work is devoted to analyzing modern approaches to representing attacks for the purpose of modeling adversarial actions and assessing system security. It is vital to adopt robust models for analyzing potential scenarios, identifying system vulnerabilities, and effectively prioritizing countermeasures. This work focuses on three primary approaches to representing attacks: attack trees, attack graphs, and matrix-based models. By examining each model’s capabilities, the paper highlights the importance of selecting or combining appropriate approaches to gain insights into attacker behavior and enhance security posture.Публікація Сентиментальний аналіз як інструмент для виявлення шкідливого контенту(ХНУРЕ, 2025) Шедін, Д. А.This work is devoted to sentiment analysis methods to detect malicious content in personal communications like social networks, e-mail and instant messengers. The features of manipulative techniques in phishing messages, fake pranks and spam messages are considered. A model is proposed that combines the analysis of emotional coloring with the identification of linguistic patterns characteristic of malicious content of a personal nature. Also, it shows where the research results can be applied.Публікація Особливості проведення криміналістичних досліджень месенджерів в операційній системі Android(ХНУРЕ, 2025) Рєзніченко, Д. Ю.This work reveals the peculiarities and possible challenges in conducting digital forensic research on modern messengers in the Android operating system. Accordingly, the article describes the security mechanisms used in the Android operating system to protect the personal data (so-called artefacts) of messenger users, as well as the tools and methods that can be used to circumvent them (security mechanisms). The paper also discusses how some popular messengers (including WhatsApp, Viber, Telegram, and Signal) use the security mechanisms built into Android.Публікація Обґрунтування вибору підходу до оцінювання ризиків інформаційної безпеки(ХНУРЕ, 2025) Усенко, М. О.; Добринін, І. С.This work is devoted to comparing four internationally recognized standards – BSI Standard 200-3, ISO/IEC 27005:2022, IEC 31010:2019, and NIST SP 800-30 Rev. 1. By utilizing the Analytic Hierarchy Process (AHP), this research evaluates the strengths and weaknesses of each standard, providing insights into their applicability and effectiveness in different organizational contexts. The findings contribute to the selection of the most suitable risk assessment methodology.Публікація Особливості реалізації процесів автоматизації та реагування на кіберзагрози у хмарних середовищах(ХНУРЕ, 2025) Фісенко, Д. М.; Білодід, В. Г.This work is devoted to determining the features of implementing security orchestration, automation and response approach. The main features and benefits of the approach were considered. The combination of SOAR and Machine Learning (ML) is critical to modern cybersecurity, enabling organizations to respond to threats faster, manage incidents more effectively, and improve the accuracy of anomaly detection.Публікація Застосування технологій машинного навчання в кібербезпеці: огляд інновацій(ХНУРЕ, 2025) Фролов, Д. І.; Дягілєва, М. С.To develop machine learning (ML) technologies, bionic and evolutionary approaches are used. ML is effectively applied for the recognition and classification of malicious software. Since 2021, there has been a significant increase in the number of published patents, indicating a growing trend of integrating artificial intelligence into cybersecurity. Related research has great scientific and commercial potential, particularly for solving tasks related to process automation and increasing system adaptability.Публікація Аналіз вразливостей, телекомунікаційних систем з технологією MU-MASSIVE MIMO(ХНУРЕ, 2025) Хелмі Муханнад; Марчук, В. С.This work is devoted to the analysis of vulnerabilities of telecommunication systems with MU-MASSIVE MIMO technology. The increase in the number of users in the service area of the base station and the high throughput of the telecommunication system increase the number of vulnerabilities. Additional sources of vulnerabilities are: IoT systems, MEC edge computing, network segmentation into separate service cells with centralized management, an increase in the number of RAN networks, the use of the millimeter wave range with a high density of base stations.Публікація Особливості захисту інформації в телекомунікаційних мережах 5G(ХНУРЕ, 2025) Хелмі Муханнад; Марчук, В. С.This work is devoted to the features of information protection in 5G telecommunication networks. In addition to standard applications, the 5G network has new ones based on virtualization and software-defined network technologies. Information protection in SDN networks lies in overcoming attacks on the path from network elements to the controller, and the presence of a virtualized NFVI infrastructure requires protection against DoS attacks and from the injection of malicious virtual network functions VNF.Публікація Захист інформації в безпроводових телекомунікаційних мережах за допомогою реконфігурованих інтелектуальних поверхонь RIS(ХНУРЕ, 2025) Хелмі Муханнад; Марчук, В. С.This work is devoted to the use of reconfigurable intelligent RIS surfaces for information protection in wireless telecommunication networks. The main purpose of RIS surfaces is to increase the range of wireless systems, for example, 5G millimeter-wave FR2. But the technology of intelligent RIS surfaces can be used to protect telecommunication systems from eavesdropping and hacking. The protection tasks are solved by controlling the RIS controller functions of the electromagnetic field formation reflected by the RIS surface.Публікація Дослідження принципів роботи анонімних браузерів(ХНУРЕ, 2025) Лембей, К. Д.This article provides the comprehensive analysis of the core mechanisms underlying anonymous browsers, with a focus on the modern Tor browser. It explores the principles of onion routing, detailing the multi-layered encryption process that ensures anonymity and prevents third-party tracking. The study examines how encryption keys are exchanged between nodes and how the network dynamically adjusts to maintain security and performance. Additionally, the work delves into potential vulnerabilities within the Tor network, including risks associated with exit nodes, traffic correlation attacks, and fingerprinting techniques that could compromise user anonymity.