Vol 5, No 2 (2017)

Table of Contents

INFORMATION TECHNOLOGY

Scenario research based on analysis of information space PDF (Українська)
Dmytro Lande, Andrii Boichenko 5-12

INFORMATION WARFARE

Negative information-psychological impact on individual consciousness based on socio-engineering approach PDF (Українська)
Volodymyr Mokhor, Oksana Tsurkan 13-19

CRYPTOLOGY

Methods of statistical tests independence verification PDF (Українська)
Liudmyla Kovalchuk, Nataliia Kuchynska 20-32

NETWORK AND APPLICATION SECURITY

The virtual private networks protocols: features of creation and perspective of development PDF (Українська)
Artem Zhylin, Serhii Valovyi, Dmytro Marynin 33-42
Use of DNSSec technology for domain names protection in the ukrainian segment of the Internet PDF (Українська)
Vitalii Zubok 43-50

MATHEMATICAL AND COMPUTER MODELING

Architecture of software based on integrated objects PDF (Українська)
Volodymyr Sokolov 51-59
Set-theoretical approach to defining of terms “classification”, “taxonomy” and “ontology” PDF (Українська)
Hryhoriy Kravtsov, Oleksandr Dolhorukov, Volodymyr Koshel 59-66

СOMPUTATIONAL METHODS

Improvement of the quadratic sieve method on the basis of the extended factor base and using available quantity of B – smooth numbers PDF (Українська)
Stepan Vynnychuk, Vitalii Misko 67-75

INFORMATION SECURITY RISK MANAGEMENT

Implementation of the process approach to managing risks of information security in the NIST documents PDF (Українська)
Yuliia Kozhedub 76-89

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION

A comparison enterprise architecture frameworks for critical IT infrastructure design PDF
Yaroslav Dorohyi, Vasyl Tsurkan, Serhii Telenyk, Olena Doroha-Ivaniuk 90-118
Method of object identification of critical information infrastructure in aviation industry PDF (Українська)
Serhii Hnatiuk, Viktoriia Sydorenko, Vasyl Kinzeriavyi 119-134
Information-telecommunication system, conceptual model of cyberspace and cybersecurity PDF (Українська)
Ihor Yakoviv 134-144

TELECOMMUNICATION SYSTEMS AND NETWORKS

Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules PDF (Українська)
Ihor Subach, Vitalii Fesokha 145-152
Method of adaptive spatial coding of signals for non-stationary frequency-selective channels of wireless communication PDF (Українська)
Liudmyla Pohrebniak, Mykola Naumenko 153-165
Using of regression analysis methods for monitoring and managing telecommunication systems PDF (Русский)
Ruslan Abduramanov, Yurii Khlaponin, Anton Khaddad 165-171