Home
  • Conference Overview
  • Conference Sessions
  • Conference Program
  • Information for Participants
  • Committee
  • Contacts
  • Archive
    • 2022
    • 2023
Home
Security of Information Technologies and Information Systems Archive 2023
  • 2022
  • 2023

 

CONFERENCE OVERVIEW
The conference aim is to provide possibility for young scientists to present their research on the topics of information security and information systems.
We invite bachelor, master and PhD students, studying at Faculty of Fundamental Sciences, VilniusTech, to present their research on the topics of information security and information systems. We also invite students and young scientists from other faculties and universities, working in that area to share their experience.
Two parallel sessions will be organized:
  • Session on Information technology security.
  • Session on Information systems.
CONFERENCE SECTIONS
Session on Information Technology Security
  • Cryptography, cryptographic protocols and their applications
  • Information security and related technologies
  • Information security management
  • Information security models and concepts
  • Promotion of scientific research in information security
Session on Information Systems
  • Conceptual modelling of information systems
  • Process modelling, analysis and simulation
  • Process automation, mining and monitoring
  • Quality of information systems
  • Information systems in a cloud
  • Big data
  • Ontologies
  • Modern database systems
CONFERENCE PROGRAM

Session on Information Technology Security will be held in SRA-I Old Senate meeting room
Time Name and Surname Presentation topic
15:30 Valdas Rupšys Lietuvos Respublikos Specialiųjų tyrimų tarnybos Informacinių technologijų valdybos Kibernetinių užduočių skyriaus pristatymas
15:50 Nelson Ndubuisi Collins Analysis of Efficiency of Newly Emerging Artificial Inteligence Techniques for Computer Network Traffic Anomaly Detection
16:00 Eda Korkmaz Development of Migration Strategy for Information Security Management Systems based on the ISO 27001
16:10 Beata Gancevska Duomenų anonimizavimo metodų taikymas Moodle virtualioje mokymosi aplinkoje
16:20 Roman Liplianskij Tinklo įrenginių be centrinio valdymo lokalių slaptažodžių valdymo metodų analizė
16:30 Oluwadamilare Selman Abesin Design and Implementation of an LSTM IDS system to improve intrusion detections at the SOC
16:40 Okechukwu Chike Opara Sustainability Aspects in Information Security Insurance on the Corporate Level
16:50 Daniel Klioc Saugios nuotolinės prieigos prie medicininės įrangos užtikrinimo metodų analizė
17:00 Ivan Gorbun Duomenų viliojimo laiškų siuntimo modelio tobulinimas taikant dirbtinį intelektą
17:10 Alptug Ince Methods of Assessing Information Security Risks in Information Systems Based on the Use of Software Robots
17:20 Ohekpeje Joel Odey Application of Visualization Methods in Information Security Risk Management
17:30 Valdemar Koženevski Atakų modeliavimas prieš programinių robotų sistemas
17:40 Justas Dargis Įsibrovimo aptikimas analizuojant kompiuterio lygmens žurnalinius įrašus iš AWSCTD duomenų rinkinio
17:50 Break  
18:05 Ema Darbutaitė Password Strength Estimation Adapted for System Clients in Lithuania
18:15 Bakhtawar Arif Automated Method for Vulnerability and Risk Checklist Generation
18:25 Tomaš Jurevič Blogų mazgų patekimo apribojimas į Ethereum tinklą naudojant kriptografinę mislę
18:35 Stanislovas Juknevičius Failų versijų ir jų fragmentų paieška skaitmeniniuose kriminalistiniuose tyrimuose iš B-Tree failinių sistemų
18:45 Kiryl Kruhlik Secure Networking Design Based on Zero Trust Principle
18:55 Daniel Paškevič Simulation and Modeling of Business Processes Using BPMN Security Extensions
19:05 Romantas Trumpa Hibridinės IT inftrastruktūros atakų vektorių tyrimas
19:15 Tomas Kanevičius Automatinių riboto naudojimo duomenų sunaikinimo metodų tyrimas
19:25 Parikshit Sukdeo Mahajan Analysis of Modern Malicious Bot Detection Methods and Their Application
19:35 Maral Muradova Detection of Anomalies and Intrusions in a Computer Network by the Means of Artificial Intelligence by Applying Artificial Intelligence to NetFlow Data
19:45 Bernardas Žukas Autonominis agentas skirtas konfigūravimo pažeidžiamumų aptikimui realiame laike vartotojų įrenginiuose
19:55 Aušrys Mikoliūnas Grasinančio turinio žinučių aptikimo naujienų komentaruose metodų tyrimas
20:05 Nikita Bernačiuk Automatizuotos sistemos, skirtos saugiam tinklui projektuoti pagal nustatytus parametrus, kūrimas

Session on Information Systems will be held in FMF meeting room SRL-I 404a
Time Name and Surname Presentation topic
15:30 Sonata Gulbinaitė Dirbtinio intelekto metodų tyrimas failo elementų atpažinime
15:45 Pavel Trostianko Automatinis 3D Scenos ir animacijos generavimas naduojant XML formatą
16:00 Artūr Šostak Neraiškiąja logika grindžiamas klimato kontrolerio su ribotais resursais kūrimo būdas
16:15 Karolis Geležauskas Salesforce verslo sistemos versijų kontrolės uždavinių automatizavimas GitHub aplinkoje
16:30 Mantas Ubartas Procesų gavybos taikymas žiniatinklio serverių žurnalams

INFORMATION FOR PARTICIPANTS

Conference will be organized on 13th of April, 15:00-19:00 in live:
  • Session on Information Technology Security will be held in SRA-I Old Senate meeting room;
  • Session on Information Systems will be held in FMF meeting room SRL-I 404a.
 Session „Information Technology Security“ will be opened by invited guest from STT Valdas Rupšys.
Registration is open till the end of April 16, by e-mail  crypt:PGEgaHJlZj0ibWFpbHRvOm5pam9sZS5jZWlraWVuZUB2aWxuaXVzdGVjaC5sdCI+bmlqb2xlLmNlaWtpZW5lQHZpbG5pdXN0ZWNoLmx0PC9hPg==:xx

You have to provide the following information to be registered for the conference:
  • presenter’s name and surname;
  • e-mail address;
  • company or university represented;
  • presentation topic;
  • co-authors names and surnames (if any);
  • session in which you are planning to participate.

 

Participants have to prepare ~10 min. presentation on their topic. It is not required to prepare a manuscript.

The best presenters will be awarded with additional point for the master thesis defense according to the order by the Prorector for Studies.

The best papers can be selected for publication in the journal „Science – Future of Lithuania“ or „New Trends in Computer Sciences“.
 
 
COMMITTEE

Scientific Committee
   Head of Scientific Committee
   Assoc. Prof. Dr. Nikolaj Goranin
   Secretary
   Dr. Dainius Čeponis

Organizational Committee
   Head of Organizational Committee
   Prof. Dr. Diana Kalibatienė
   Secretary
   lekt. Nijolė Čeikienė
 
CONTACTS

Questions related to „Information Technology Security“ section
Assoc. Prof. Dr. Nikolaj Goranin, e-mail  crypt:bmlrb2xhai5nb3JhbmluQHZpbG5pdXN0ZWNoLmx0:xx

Questions related to „Information system“ section
Prof. Dr. Diana Kalibatienė, e-mail  crypt:ZGlhbmEua2FsaWJhdGllbmVAdmlsbml1c3RlY2gubHQ=:xx

Organizational questions and Registration
Lekt. Nijolė Čeikienė, e-mail  crypt:bmlqb2xlLmNlaWtpZW5lQHZpbG5pdXN0ZWNoLmx0:xx
    • Page administrators:
    • Nijolė Čeikienė
    • Ugnė Daraškevičiūtė
    • Jelena Kabulova
    • Daiva Versekėnienė
Conference Overview
Conference Overview
Conference Sessions
Conference Sessions
Conference Program
Conference Program
Information for Participants
Information for Participants
Committee
Committee
Contacts
Contacts
Archive
Archive
2022
2023
  • Contacts

VILNIUS TECH Faculty of Fundamental Sciences
Department of Information Systems
Conference mail: crypt:aXNrLmpta0B2aWxuaXVzdGVjaC5sdA==:xx
  crypt:PGEgaHJlZj0ibWFpbHRvOkFudGFuYXMua29udHJpbWFzQHZpbG5pdXN0ZWNoLmx0IiBzdHlsZT0icG9pbnRlci1ldmVudHM6IG5vbmU7Y29sb3I6IHJnYmEoMCwgMCwgMCwgMCk7IHBvc2l0aW9uOiBhYnNvbHV0ZTsiPkFudGFuYXMua29udHJpbWFzQHZpbG5pdXN0ZWNoLmx0PC9hPg==:xx
e-solution Mediapark
e-solution Mediapark
ATHENA