Table of Contents
INFORMATION TECHNOLOGY
Searching technology for questionable records when creating the Unified registry of ukrainian individuals identification | PDF (Українська) |
Yaroslav Dorohyi | 114-125 |
INFORMATION SECURITY
Information security aspects of business continuity management | PDF (Українська) |
Nataliia Kukharska, Orest Polotai | 126-136 |
Cybersecurity as a component of information security of Ukraine | PDF (Українська) |
Viktor Horlynskyi, Borys Horlynskyi | 136-148 |
INFORMATION WARFARE
The approach to automated detection of destructive cyber influences | PDF (Українська) |
Yurii Danyk, Kostiantyn Sokolov, Oleh Hudyma | 149-160 |
Methods of counteracting social engineering | PDF (Українська) |
Oksana Tsurkan, Rostyslav Herasymov, Olha Kruk | 161-170 |
NETWORK AND APPLICATION SECURITY
Problems of protection of informational resources when using cloud technologies | PDF (Українська) |
Artem Zhylin, Andrii Divitskyi, Anna Kozachok | 171-182 |
MATHEMATICAL AND COMPUTER MODELING
Basic model of information processes and behavior of a cyber defense system | PDF (Українська) |
Ihor Yakoviv | 183-196 |
INFORMATION SECURITY RISK MANAGEMENT
Conceptual basis of description for the information security management system architecture | PDF (Українська) |
Volodymyr Mokhor, Vasyl Tsurkan | 197-207 |
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Architecture and functional model of a perspective proactive intellectual SIEM for cyber protection of objects of critical infrastructure | PDF (Українська) |
Ihor Subach, Artem Mykytiuk, Volodymyr Kubrak | 208-215 |
TELECOMMUNICATION SYSTEMS AND NETWORKS
Method of space-frequency block coding with dual-mode index modulation aided OFDM | PDF (Українська) |
Vyacheslav Solodovnick, Mykola Naumenko | 216-229 |