<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ivan Burmaka</style></author><author><style face="normal" font="default" size="100%">Nicolai Stoianov</style></author><author><style face="normal" font="default" size="100%">Vitalii Lytvynov</style></author><author><style face="normal" font="default" size="100%">Mariia Dorosh</style></author><author><style face="normal" font="default" size="100%">Svitlana Lytvyn</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Proof of Stake for Blockchain Based Distributed Intrusion Detecting System</style></title><secondary-title><style face="normal" font="default" size="100%">Advances in Intelligent Systems and Computing 1265</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Cham</style></pub-location><pages><style face="normal" font="default" size="100%">237-247</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vitalii Lytvynov</style></author><author><style face="normal" font="default" size="100%">Mariia Dorosh</style></author><author><style face="normal" font="default" size="100%">Iryna Bilous</style></author><author><style face="normal" font="default" size="100%">Mariia Voitsekhovska</style></author><author><style face="normal" font="default" size="100%">Valentyn Nekhai</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Development of the automated information system for organization’s information security culture level assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Technical sciences and technologie</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">March 2020</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://ir.stu.cn.ua/123456789/19863</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">1</style></volume><pages><style face="normal" font="default" size="100%">124-32</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">19</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mariia Dorosh</style></author><author><style face="normal" font="default" size="100%">Mariia Voitsekhovska</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Functional Modeling of the Organization's ISC State Monitoring System during Project Implementation</style></title><secondary-title><style face="normal" font="default" size="100%">DIGILIENCE 2020</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Given the situation when recently there is a mass transition to remote work through quarantine, there are new challenges to protect information at another level. Working from home significantly increases existing information security risks and creates new ones that need to be identified and monitored. Thus, the issue of creating information systems for monitoring the level of information security of the organization has recently become increasingly important.&lt;/p&gt;&lt;p&gt;The paper proposes a functional model of the organization&amp;#39;s ISC state monitoring system, which determines the input and output parameters, management and implementation of processes. The model may be used in the further development of information systems to solve both individual problems and to create a comprehensive automated monitoring system. Within the framework of the constructed model it is possible to single out project activity, which has such features as: temporality, distribution in time and space, diversity of tasks. In this case, the assessment of information security should take into account the maturity stages of such systems presented in the article. It serves to evaluate the level of development of information security systems of all the project participants and to form an integrated secure information system of the project in the general security system of the organization.&lt;/p&gt;&lt;p&gt;This paper is included in the program of the Second Scientific Conference &amp;quot;Digital Transformation, Cyber Security and Resilience &lt;a href=&quot;https://digilience.org/content/digilience-2020-program&quot;&gt;DIGILIENCE 2020&lt;/a&gt; and will be published in the post-conference volume.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Valentin V. Nekhai</style></author><author><style face="normal" font="default" size="100%">Mariia Dorosh</style></author><author><style face="normal" font="default" size="100%">Valentin A. Nekhai</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Using the Cyber Situational Awareness Concept for Protection of Agricultural Enterprise Management Information Systems</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">control system</style></keyword><keyword><style  face="normal" font="default" size="100%">Cyber Situational Awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">Information System</style></keyword><keyword><style  face="normal" font="default" size="100%">network protection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">168-181</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;There are similarities in information management between military and agricultural systems, e.g. distribution, impact of the environment, mobile agents, and the human factor are functioning in 2- and 3-dimensional space. This allows spin-offs in the implementation of the concept of Cyber Situational Awareness (CSA), which is studied intensively in the defence field, but so far has not been applied with the aim to protect agricultural enterprise management systems.&lt;/p&gt;&lt;p&gt;The purpose of this study is to substantiate the directions for the implementation of the CSA concept for the protection of corporate networks of agricultural enterprises, with the hypothesis that this will allow effective protection. The methodological basis is formed by the current provisions of the CSA concept, system analysis and synthesis.&lt;/p&gt;&lt;p&gt;Results. The stability of communication channels and security is largely determined by the reliability of data transmission in the network, which is ensured by the design of the appropriate network structure. This in turn will provide opportunities to implement the first level of the CSA concept in IT to protect agricultural management systems.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">168</style></section></record></records></xml>