Table of Contents
INFORMATION TECHNOLOGY
Creation of language networks based on texts with using visibility graphs algorithms | PDF (Українська) |
Dmytro Lande, Oleh Dmytrenko | 5-18 |
INFORMATION SECURITY
Analysis of stability of the user’s keyboard handwriting characteristics in the biometric authentication systems | |
Viktor Yevetskyi, Ivan Horniichuk | 19-28 |
Functional model of information security systems | PDF (Українська) |
Yuliia Kozhedub | 29-42 |
INFORMATION WARFARE
Detection of vulnerabilities of the computer systems and networks using social engineering techniques | |
Oksana Tsurkan, Rostyslav Herasymov | 43-50 |
NETWORK AND APPLICATION SECURITY
Functional model of cybersecurity situation center | PDF (Українська) |
Artem Zhylin, Mykola Khudyncev, Maksym Litvinov | 51-67 |
MATHEMATICAL AND COMPUTER MODELING
Structural analysis of the compounds of integral objects | PDF (Українська) |
Volodymyr Sokolov | 68-78 |
СOMPUTATIONAL METHODS
The modified algorithm of fermat’s factorization method with base foundation of module | PDF (Українська) |
Stepan Vynnychuk, Yevhen Maksymenko | 79-93 |
INFORMATION SECURITY RISK MANAGEMENT
Risk assessment presentation of information security by the risks map | PDF (Українська) |
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan | 94-104 |
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Fundamentals methodology of formation cyber competences at security sector experts and Ukraine defense | PDF (Українська) |
Yuriy Danyk, Oleksandr Korneiko | 105-123 |
TELECOMMUNICATION SYSTEMS AND NETWORKS
Resources distribution model of critical IT infrastructure with clear parameters based on the genetic algorithm | PDF (Українська) |
Yaroslav Dorohyi, Olena Doroha-Ivaniuk, Dmytro Ferens | 124-144 |