Vol 3, No 1 (2015)

Table of Contents

INFORMATION TECHNOLOGY

Construction domain model of information security by probing Google Scholar Citations service PDF (Русский)
Dmitrii Lande 4-11
Application of cloud technologies in constructing situation management systems PDF (Українська)
Oleksii Kovalenko 11-18

INFORMATION SECURITY

About features of the system and process approaches creating ІТ projects in the field of information security PDF (Українська)
Yuliya Kozhedub 19-24

INFORMATION WARFARE

Information component of hybrid war PDF (Русский)
Aleksander Bohdanov 25-30
Methods hybrid war of Russia against Ukraine. Areas counter PDF (Українська)
Valentyn Petryk, Yurii Kanarskyi 30-37

MATHEMATICAL AND COMPUTER MODELING

Novel pseudo-random sequence of numbers generator based cellular automata PDF
Stepan Bilan, Mykola Bilan, Sergii Bilan 38-50
Simulation method of digital circuits with faults PDF (Русский)
Vasyl Kulikov, Vitalii Kravchuk 50-59

INFORMATION SECURITY RISK MANAGEMENT

Analytical geometry approach for information security risks analyses PDF
Volodymyr Mokhor, Vitalii Bezshtanko, Serhii Honchar, Hryhorii Kravtsov, Ihor Kotsiuba, Olha Kruk, Oleksander Makarevych, Yevhen Maksymenko, Vasyl Tsurkan 60-67

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION

The base model of informational processes of management and safety criteria for cybernetic systems PDF (Русский)
Igor Yakoviv 68-74