{"title":"Інтернет речей: Проблеми безпеки та основні засади її забезпечення","authors":"М.В. Диха","doi":"10.34054/BDC006","DOIUrl":"https://doi.org/10.34054/BDC006","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117154710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"«Legal Asymmetry»in the Context of Liability of the State and State-Sponsored Cyber Attacks Actors","authors":"Oksana Bulda","doi":"10.34054/BDC003","DOIUrl":"https://doi.org/10.34054/BDC003","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130755815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behind the digital curtain: A look inside the Russian Information War against the West","authors":"Marta Barandiy, Promote Ukraine","doi":"10.34054/BDC001","DOIUrl":"https://doi.org/10.34054/BDC001","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131356477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal and Ethical Aspects of Autonomous Weapons, Cyberattacks, and AI","authors":"I. Kotsiuba","doi":"10.34054/BDC004","DOIUrl":"https://doi.org/10.34054/BDC004","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115920443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Зростання Поширення Інтернету Речей та Проблеми Безпеки в Часи Кібератак","authors":"Валентина Михайловна Головач","doi":"10.34054/BDC010","DOIUrl":"https://doi.org/10.34054/BDC010","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115332378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ризики бізнесу: Зміна акцентів","authors":"Валентина ЛУК’ЯНОВА","doi":"10.34054/BDC007","DOIUrl":"https://doi.org/10.34054/BDC007","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction, integration and data processing in the SIEM «SPLUNK»","authors":"P. Venherskyi, R. Karpiuk","doi":"10.34054/BDC002","DOIUrl":"https://doi.org/10.34054/BDC002","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124628653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The importance of elaborated training for information security specialists","authors":"P. Venherskyi, Mykhailo Kropyva","doi":"10.34054/BDC005","DOIUrl":"https://doi.org/10.34054/BDC005","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131116636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Monastyrskyi, Yaroslav Boyko, Bogdan Sokolovskyi, O. Sinkevych
{"title":"A Fast Empirical Method for Detecting Fake News","authors":"L. Monastyrskyi, Yaroslav Boyko, Bogdan Sokolovskyi, O. Sinkevych","doi":"10.34054/BDC009","DOIUrl":"https://doi.org/10.34054/BDC009","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Features of Russian-Ukrainian Cyberwar","authors":"V. Lozynskyi, O. Petryshyn, L. Monastyrskyi","doi":"10.34054/BDC008","DOIUrl":"https://doi.org/10.34054/BDC008","url":null,"abstract":"","PeriodicalId":151103,"journal":{"name":"Proceedings of the conference \"Behind the Digital Curtain. Civil Society vs State Sponsored Cyber Attacks\"","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}