Vol 3, No 2 (2015)

Table of Contents

INFORMATION TECHNOLOGY

Comparative evaluation of centrality criterion in a hierarchical network PDF (Українська)
Dmytro Lande, Olga Sulema 80-87

INFORMATION SECURITY

Assessment of insider attack with learning statistics methods PDF
Volodymyr Mokhor, Hryhorii Kravtsov, Ihor Kotsiuba 88-95
Create documentation for information security management systems PDF (Українська)
Yuliya Kozhedub 95-100
Revealing channels of information leakage due to stray electromagnetic radiation and guidance by treating the spectrum microwave frequency PDF (Русский)
Yurii Khlaponin 100-107

CRYPTOLOGY

Method for quality evaluation of trit pseudorandom sequence to cryptographic applications PDF (Українська)
Serhii Hnatiuk, Tetiana Zhmurko, Vasyl Kinzeriavyi, Nurhul Seilova 108-116

NETWORK AND APPLICATION SECURITY

Detecting DDoS attack using MapReduce operations PDF (Українська)
Andrii Holovin 117-124

MATHEMATICAL AND COMPUTER MODELING

Simulation software performance reliability special provision of communication PDF (Українська)
Serhii Hnatiuk, Oleksandr Korneiko 125-132
Evaluation of certain signs and their collectively for individual recognition objects PDF (Русский)
Viktor Yevetskyi 132-137

INFORMATION SECURITY RISK MANAGEMENT

Information security risk assessment based on spectral approach PDF (Українська)
Yevhen Maksymenko, Vasyl Tsurkan, Yaroslav Dorohyi, Olha Kruk 138-146

TELECOMMUNICATION SYSTEMS AND NETWORKS

Probability of intercept single hop transmitter with frequency hopping spread spectrum using search receiver PDF (Українська)
Serhii Vasylenko 147-151
Research of multiplex signal of UAV management PDF (Українська)
Denys Bakhtiiarov 152-159