SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Kuzminykh Ievgeniia) "

Sökning: WFRF:(Kuzminykh Ievgeniia)

  • Resultat 1-10 av 13
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Carlsson, Anders, et al. (författare)
  • Virtual Security Labs Supporting Distance Education in ReSeLa Framework
  • 2019
  • Ingår i: Advances in Intelligent Systems and Computing. - Cham : Springer Verlag. - 9783030119348 ; , s. 577-587
  • Konferensbidrag (refereegranskat)abstract
    • To meet the high demand of educating the next generation of MSc students in Cyber security, we propose a well-composed curriculum and a configurable cloud based learning support environment ReSeLa. The proposed system is a result of the EU TEMPUS project ENGENSEC and has been extensively validated and tested. © 2019, Springer Nature Switzerland AG.
  •  
2.
  • Kuzminykh, Ievgeniia, 1984- (författare)
  • A combined LIFO-Priority algorithm for overload control of SIP server
  • 2012
  • Ingår i: International Conference on Modern Problems of Radio Engineering Telecommunications and Computer Science (TCSET), 21-24 Feb. 2012, Lviv-Slavske, Ukraine. - Lviv-Slavske, Ukraine. - 9786176071389 - 9781467302838
  • Konferensbidrag (refereegranskat)abstract
    • In this paper a simulation model of message service procedure in SIP server in the normal conditions and in the congestion state is represented. The paper proposes local overload control for SIP server applied FIFO discipline in normal state and LIFO discipline with priority service model during overload.
  •  
3.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • A performance evaluation of sensor nodes in the home automation system based on arduino
  • 2019
  • Ingår i: 2019 IEEE International Scientific-Practical Conference. - : Institute of Electrical and Electronics Engineers Inc.. - 9781728141848 ; , s. 511-516
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, a home automation system model was constructed with purpose to investigate of the correlation between the performance of wireless communication, power consumption of the constrained IoT devices and security. The series of experiments were conducted using sensor nodes connected to Arduino microcontroller and an RF 433 MHz wireless communication module. Measurements of the execution time and power consumption of the Arduino during data transfer with different security levels, as well as the analysis of the experimental results, were performed. The results show that the lifetime of the IoT device is determined by the communication speed, sleep mode management and depends on encryption. The obtained results can be used to minimize the power consumption of the device and improve communication efficiency. The results show that applied security reduces the productivity and lifetime of the sensor node not significantly. © 2019 IEEE.
  •  
4.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
  • 2018
  • Ingår i: Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2018, ruSMART 2018. Lecture Notes in Computer Science, vol 11118. - Cham : Springer. - 9783030011673 - 9783030011680 ; , s. 52-63
  • Konferensbidrag (refereegranskat)abstract
    • This paper represents new functional architecture for the Internet of Things systems that use an avatar concept in displaying interaction between components of the architecture. Object-oriented representation of “thing” in the avatar concept allows simplify building and deployment of IoT systems over the web network and bind “things” to such application protocols as HTTP, CoAP, and WebSockets mechanism. The assets and stakeholders for ensuring security in IoT were specified. These assets are needed to isolate the risks associated with each of assets of IoT system. Example of Thing Instance’s description and its functionality using JSON format is shown also in the paper.
  •  
5.
  • Kuzminykh, Ievgeniia (författare)
  • Avatar Conception for “Thing” Representation in Internet of Things
  • 2018
  • Ingår i: Proccedings of SNCNW 2018, Karlskrona, May 31 - June 1, 2018. ; , s. 46-49
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • The complexity of ensuring IoT security is that the system is heterogeneous, consists of many assets on each of the architecture layer. Many experts in IoT security focus on threat analysis  and risk assessments to estimate the impact if a security incident or a breach occurs.In order to provide the general security requirements for the IoT system using threat risk modelling, the first thing to do is to identify the main security stakeholders, security assets, possible attacks, and, finally, threats for the IoT system. Using this general IoT threat model as a basis you can create a specific set of security objectives for a specific IoT application domain.In this paper we will try to highlight the assets that necessary for further analysis of the treat model for Internet of Things. We will also specify the stakeholders who are the connecting link between IoT devices, services and customers, as well as link between transfer and displaying the client commands onto smart things.For describing the model of component interaction in IoT system we will use the avatar-oriented approach since it allows us to merge objects into a system of objects. IoT Service has a more complex structure than a single entity. The application can use several services to display all information to end user, can aggregate data from several devices.To manipulate data objects the avatar representation approach is most appropriate, then you can easily connect or disconnect microservices, data from things, visual representation of data.
  •  
6.
  • Kuzminykh, Ievgeniia, 1984-, et al. (författare)
  • Development of smart infocommunication networks for intellectual municipal services
  • 2015
  • Ingår i: Second International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), 13-15 Oct. 2015, Kharkiv, Ukraine. - Kharkiv, Ukraine : IEEE. - 9789669751928
  • Konferensbidrag (refereegranskat)abstract
    • Abstract:This paper represents the smart system that bypasses the normal functioning algorithm of traffic lights, triggers a green light when the lights are red or to reset the timer of the traffic lights when they are about to turn red. Different pieces of hardware like microcontroller units, transceivers, resistors, diode, LEDs, digital compass and accelerometer will be coupled together and programmed to create a unified complex intelligent system.
  •  
7.
  • Kuzminykh, Ievgeniia, 1984- (författare)
  • Development of traffic light control algorithm in smart municipal network
  • 2016
  • Ingår i: 13th International Conference on Modern Problems of Radio Engineering. Telecommunications and Computer Science (TCSET),  23-26 Feb. 2016, Lviv, Ukraine. - Lviv, Ukraine : IEEE. - 9786176078074
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents smart system that bypasses the normal functioning algorithm of traffic lights, triggers a green light when the lights are red or reset the timer of the traffic lights when they are about to turn red. Different pieces of hardware like microcontroller units, transceivers, resistors, diodes, LEDs, a digital compass and accelerometer will be coupled together and programed to create unified complex intelligent system.
  •  
8.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • Investigation of the IoT Device Lifetime with Secure Data Transmission
  • 2019
  • Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Cham : Springer Verlag. - 9783030308582 ; , s. 16-27
  • Konferensbidrag (refereegranskat)abstract
    • This paper represents the approach for estimation of the lifetime of the IoT end devices. The novelty of this approach is in the taking into account not only the energy consumption for data transmission, but also for ensuring the security by using the encryption algorithms. The results of the study showed the effect of using data encryption during transmission on the device lifetime depending on the key length and the principles of the algorithm used. © 2019, Springer Nature Switzerland AG.
  •  
9.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • Measuring a LoRa Network : Performance, Possibilities and Limitations
  • 2018
  • Ingår i: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Cham : Springer. - 9783030011673 - 9783030011680 ; , s. 116-128
  • Konferensbidrag (refereegranskat)abstract
    • Low power wide area (LPWA) technologies becomes popular for IoT use cases because LPWA is enable the broad range communications and allows to transmit small amounts of information in a long distance. Among LPWA technologies there are LTE-M, SigFox, LoRa, Symphony Link, Ingenu RPMA, Weightless, and NB-IoT. Currently all these technologies suffer from lack of documentation about deployment recommendation, have non-investigated limitations that can affect implementations and products using such technologies. This paper is focused on the testing of LPWAN LoRa technology to learn how a LoRa network gets affected by different environmental attributes such as distance, height and surrounding area by measuring the signal strength, signal to noise ratio and any resulting packet loss. The series of experiments for various use cases are conducted using a fully deployed LoRa network made up of a gateway and sensor available through the public network. The results will show the LoRa network limitation for such use cases as forest, city, open space. These results allow to give the recommendation for companies during early analysis and design stages of network life circle, and help to choose properly technology for deployment an IoT application.
  •  
10.
  • Kuzminykh, Ievgeniia, et al. (författare)
  • On keystroke pattern variability in virtual desktop infrastructure
  • 2021
  • Ingår i: CEUR Workshop Proceedings. - : CEUR-WS. ; , s. 238-248
  • Konferensbidrag (refereegranskat)abstract
    • The paper investigates the impact of network traffic and network characteristics on the effectiveness of keystroke dynamics for continuous and one-time authentication in the remote desktop applications and virtual desktop infrastructure. The context presented in the paper contributes to the area of biometric authentication systems by identifying virtual desktop environment as a specific application domain that uses a keystroke pattern for user verification and identifying at what extent the context influences on permanence and the immunity of the keystroke data which was never studied before. The results showed that the keystroke pattern is not affected by network latency, but standard deviation, jitter, and packet loss have a significant combined impact onto it. It can also be concluded that RDP packets are not prioritized during transmission over the network, and therefore, we can say that any other competing traffic is likely to render keystroke dynamics unusable for continuous authentication during remote access. © 2021 Copyright for this paper by its authors.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 13

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy