Table of Contents
INFORMATION TECHNOLOGY
Quasi-hierarchical social network nodes ranking in terms of logarithmic function of its link weights | PDF (Українська) |
Artem Soboliev, Dmytro Lande | 4-14 |
An ontology modelling human resources management for innovational domains | |
Anatolii Hladun, Yuliia Rohushyna, Ihor Subach | 15-25 |
INFORMATION SECURITY
Organizational paradigm for providing of information security | PDF (Українська) |
Yuliia Kozhedub | 26-36 |
CRYPTOLOGY
Distributing of point division on 4 results of Edwards curve points group to adjacement classes | PDF (Українська) |
Oleksandr Telizhenko | 37-45 |
NETWORK AND APPLICATION SECURITY
Сybernetic model of the advanced persisten threat | PDF (Українська) |
Ihor Yakoviv | 46-58 |
MATHEMATICAL AND COMPUTER MODELING
Streaming clustering algorithm for monitoring and condition's diagnostics of technical real-time systems | PDF (Українська) |
Dmytro Sharadkin | 59-74 |
INFORMATION SECURITY RISK MANAGEMENT
Аnalysis of information security risk assessment representation methods | PDF (Українська) |
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan | 75-84 |
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Specifics cryptographic currencies and their role in modern financial systems in terms of security | PDF (Русский) |
Vyacheslav Voloshin | 85-95 |
Analysis of critical IT infrastructure designing problems for a ministry | PDF (Українська) |
Ihor Bondarenko, Yaroslav Dorohyi, Sergii Stirenko, Tymur Shemsedynov | 96-107 |
TELECOMMUNICATION SYSTEMS AND NETWORKS
Method of redistribution reading in multiple transmitting networks | PDF (Українська) |
Vladyslav Hol, Vladyslav Tychynskyi | 108-117 |