Vol 4, No 2 (2016)

Table of Contents

INFORMATION TECHNOLOGY

Nonlinear properties of agent-based news distribution model PDF (Русский)
Dmytro Lande, Vadym Dodonov 137-146
Сonstruction of multilevel multiagent information systems based on knowledge PDF (Українська)
Oleksii Kovalenko 146-154
The main statements of ontology theory and its implementation in the system of legal knowledge PDF (Українська)
Serhii Kosenko 154-171

INFORMATION SECURITY

Building protection systems on the basis of information multilevel hierarchical model PDF (Русский)
Serhii Toliupa, Oleksandr Uspenskyi 172-181
The system of providing authorship protection for digital photo PDF (Українська)
Ihor Yakoviv, Andrii Davydiuk, Ihor Kulykivskyi 182-189
Method for rules forming of incidents extrapolation for network-centric information and telecommunication systems monitoring PDF (Українська)
Petro Pavlenko, Mykola Vinohradov, Serhii Hnatiuk, Andrii Hizun, Viktor Hnatiuk 189-199
Сollection, processing, use and protection of information in the documents of high social significance PDF (Українська)
Yuliia Kozhedub, Tetiana Lisnichenko 199-206
Statistical reliability of noise hindrance for ensuring protection against leakage of information through technical channels PDF
Serhii Ivanchenko, Vitalii Bezshtanko, Oleksii Havrylenko 207-215

INFORMATION WARFARE

Mathematical model of information influence on the interaction contractor PDF (Українська)
Mykola Kubiavka 216-222

MATHEMATICAL AND COMPUTER MODELING

Hardware-software realisation of the generator of subkey based on the cellular automata PDF (Українська)
Stepan Bilan, Andrii Demash 223-235
Decreasing the total number of logic elements in the classis two-step multiplier with a help of Vivado HLS PDF (Українська)
Olha Sholohon, Yuliia Sholohon 235-243

СOMPUTATIONAL METHODS

Formation of non-uniformity increment for the basic module base in the problem of Fermat’s factorization method PDF (Русский)
Stepan Vynnychuk, Yevhen Maksymenko 244-254

INFORMATION SECURITY RISK MANAGEMENT

Use of entropy approach for information security risks assessment PDF (Українська)
Volodymyr Mokhor, Vasyl Tsurkan, Yaroslav Dorohyi, Serhii Mykhailov, Oleksandr Bakalynskyi, Heorhii Krykhovetskyi, Ihor Bohdanov 255-261

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION

Аnalysis of the factors influencing condition cybersecurity of information system of object of the critical infrastructure PDF (Українська)
Serhii Honchar, Hennadii Leonenko 262-268

TELECOMMUNICATION SYSTEMS AND NETWORKS

Method of solving problem for information resources distribution in ACS special purpose in the amount of information blocks variability PDF (Українська)
Ihor Subach, Oleksandr Chauzov, Nina Kuchuk 269-276
Rationale method of prior diagnostic modules development of technical support modular prospective hardware for special communications means PDF (Українська)
Lev Sakovych, Vadym Romanenko, Ihor Hyrenko 276-285