Vol 6, No 2 (2018)

Table of Contents

INFORMATION TECHNOLOGY

Creation of language networks based on texts with using visibility graphs algorithms PDF (Українська)
Dmytro Lande, Oleh Dmytrenko 5-18

INFORMATION SECURITY

Analysis of stability of the user’s keyboard handwriting characteristics in the biometric authentication systems PDF
Viktor Yevetskyi, Ivan Horniichuk 19-28
Functional model of information security systems PDF (Українська)
Yuliia Kozhedub 29-42

INFORMATION WARFARE

Detection of vulnerabilities of the computer systems and networks using social engineering techniques PDF
Oksana Tsurkan, Rostyslav Herasymov 43-50

NETWORK AND APPLICATION SECURITY

Functional model of cybersecurity situation center PDF (Українська)
Artem Zhylin, Mykola Khudyncev, Maksym Litvinov 51-67

MATHEMATICAL AND COMPUTER MODELING

Structural analysis of the compounds of integral objects PDF (Українська)
Volodymyr Sokolov 68-78

СOMPUTATIONAL METHODS

The modified algorithm of fermat’s factorization method with base foundation of module PDF (Українська)
Stepan Vynnychuk, Yevhen Maksymenko 79-93

INFORMATION SECURITY RISK MANAGEMENT

Risk assessment presentation of information security by the risks map PDF (Українська)
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan 94-104

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION

Fundamentals methodology of formation cyber competences at security sector experts and Ukraine defense PDF (Українська)
Yuriy Danyk, Oleksandr Korneiko 105-123

TELECOMMUNICATION SYSTEMS AND NETWORKS

Resources distribution model of critical IT infrastructure with clear parameters based on the genetic algorithm PDF (Українська)
Yaroslav Dorohyi, Olena Doroha-Ivaniuk, Dmytro Ferens 124-144