Deep learning based massive MIMO beamforming for 5G mobile network

T Maksymyuk, J Gazda, O Yaremko… - 2018 IEEE 4th …, 2018 - ieeexplore.ieee.org
The rapid increasing of the data volume in mobile networks forces operators to look into
different options for capacity improvement. Thus, modern 5G networks became more …

[PDF][PDF] Heterogeneous Data with Agreed Content Aggregation System Development.

L Chyrun, A Kowalska-Styczen, Y Burov, A Berko… - MoMLeT, 2019 - ceur-ws.org
A web-based service for the automation of contextual advertising management in Google
AdWords system are developed. An analysis of the Internet advertising market, the vector of …

Self-adaptive system for the corporate area network resilience in the presence of botnet cyberattacks

S Lysenko, O Savenko, K Bobrovnikova… - … Conference, CN 2018 …, 2018 - Springer
The paper presents a self-adaptive system for the corporate area networks' resilience in the
presence of botnets' cyberattacks. The resilience is ensured by the adaptive reconfiguration …

Development of solar panels detector

V Golovko, A Kroshchanka… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
The paper describes the method of detection of roof-installed solar photovoltaic panels in
low-quality satellite photos. It is important to receive the geospatial data (such as country, zip …

Compression of network traffic parameters for detecting cyber attacks based on deep learning

M Komar, A Sachenko, V Golovko… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
The approach to compress network traffic parameters in systems for detecting attacks on
telecommunication networks using the neural network and nonlinear principal components …

[PDF][PDF] An Intelligent System of the Content Relevance at the Ex-ample of Films According to User Needs

V Lytvyn, A Gozhyj, I Kalinina, V Vysotska, V Shatskykh… - 2019 - sci.ldubgd.edu.ua
In the work the methods of forming recommendations to user are analyzed, an overview of
existing recommender systems is implemented. The object of research is the process of …

Malware Detection By Distributed Systems with Partial Centralization

B Savenko, A Kashtalian, S Lysenko… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
The paper proposes approach to use new tools for malware detection in corporate networks,
which are distributed systems with partial centralization. To make decision about malware …

Development of the quantitative method for automated text content authorship attribution based on the statistical analysis of N-grams distribution

V Lytvyn, V Vysotska, I Budz, Y Pelekh… - … -European Journal of …, 2019 - neliti.com
The peculiarities of the application of linguo-statistics technologies for the identification of
the style of the author of text content of scientific and technical profile are considered …

High performance adaptive system for cyber attacks detection

M Komar, V Kochan, L Dubchak… - 2017 9th IEEE …, 2017 - ieeexplore.ieee.org
To increase the security of intrusion detection system, generalized structure of highly
performance adaptive system for cyber attacks detection was developed. To improve its …

[PDF][PDF] The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.

G Markowsky, O Savenko, S Lysenko… - ICTERI …, 2018 - ceur-ws.org
The paper presents an approach for the metamorphic viruses detection based on its
obfuscation features analysis. The obfuscation features were obtained on the basis of the …