Vol 1, No 1 (2012)

Table of Contents

A new look at the concept of "weapons of mass destruction" PDF (Русский)
Aleksandr Bohdanov 07-15
Determinating shortest paths from one vertex using an algorithm of breadth-first search PDF (Русский)
Stepan Vynnychuk 16-20
Speech recognition in artificial intelligence systems PDF (Українська)
Oleh Berdnykov, Kostiantyn Bohush, Yurii Bohush 21-24
Detecting abnormal behavior of users of computer systems using artificial neural networks PDF (Українська)
Vasyl Kulikov, Oleksandr Ivashchenko, Oleksandr Kozlov 25-30
Relationship of information and signs PDF (Русский)
Ihor Yakovyv 31-41
Optimum demodulation of digital signal, that observed on the background of similar powerful obstacle PDF (Українська)
Viktor Yerokhin, Yevhen Peleshok 42-53
Graph-analytical model of group search of defects while repairing the equipment of special communication PDF (Українська)
Vadym Romanenko 53-61
Diagnostic model of digital radioelectronic component of special communications equipment PDF (Українська)
Mykola Zherdiev, Lev Sakovych, Serhii Hlukhov, Pavlo Popov 62-68
Analytical model of assessment of message processing time in the management of telecommunications networks PDF (Українська)
Mykola Nesterenko, Oleksandr Romanov, Oleksandr Uspenskyi 69-75
Model of failures of modern information and telecommunication networks for predicting control at the services management level PDF (Українська)
Valerii Lipivskyi 76-82
Approach to building inspection tests of digital devices on extra large integrated circuits PDF (Українська)
Vasyl Kulikov 83-92
Maliciously created hardware PDF (Українська)
Anatolii Serhiienko 93-100
Detecting computer attacks in information and telecommunication systems on the basis of inductive forecasting PDF (Українська)
Serhii Liventsev, Anton Storchak 100-104
Organization of secure exchange of SOAP-messages between ASP.NET Web-service and Web-application using block encryption algorithm AES PDF (Українська)
Serhii Liubarskyi, Petro Shatsilo 105-114
Using WMI technologies to ensure the integrity and confidentiality of scenarios in problems of automation of processes of managing Windows operating systems PDF (Українська)
Nestor Melnyk, Sviatoslav Parshukov 115-123
Features of using tablet computers Apple IPad 2 to protect confidential information in distributed information and telecommunication systems PDF (Русский)
Serhii Anpilohov, Andrii Voloshyn 123-132