Issue | Title | |
Vol 6, No 2 (2018) | Risk assessment presentation of information security by the risks map | Abstract |
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan | ||
Vol 4, No 1 (2016) | Implementation of information security management system in organization | Abstract PDF |
Vitalii Bezshtanko, Oleksandr Makarevych | ||
Vol 7, No 2 (2019) | Cybersecurity as a component of information security of Ukraine | Abstract |
Viktor Horlynskyi, Borys Horlynskyi | ||
Vol 6, No 1 (2018) | Аnalysis of information security risk assessment representation methods | Abstract |
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan | ||
Vol 7, No 2 (2019) | Problems of protection of informational resources when using cloud technologies | Abstract |
Artem Zhylin, Andrii Divitskyi, Anna Kozachok | ||
Vol 4, No 1 (2016) | Analyzing of eligibility of complex risks of information security by analytical geometry methods | Abstract |
Volodymyr Mokhor, Oleksandr Bakalynskyi, Oleksandr Bohdanov, Vasyl Tsurkan | ||
Vol 6, No 2 (2018) | Functional model of information security systems | Abstract |
Yuliia Kozhedub | ||
Vol 6, No 1 (2018) | Organizational paradigm for providing of information security | Abstract |
Yuliia Kozhedub | ||
Vol 4, No 2 (2016) | Use of entropy approach for information security risks assessment | Abstract |
Volodymyr Mokhor, Vasyl Tsurkan, Yaroslav Dorohyi, Serhii Mykhailov, Oleksandr Bakalynskyi, Heorhii Krykhovetskyi, Ihor Bohdanov | ||
Vol 4, No 2 (2016) | Decreasing the total number of logic elements in the classis two-step multiplier with a help of Vivado HLS | Abstract |
Olha Sholohon, Yuliia Sholohon | ||
Vol 4, No 1 (2016) | Anomaly detection system for mobile carrier based on Big Data concept | Abstract |
Serhii Bondarovets, Oksana Koval, Serhii Hnatiuk | ||
Vol 5, No 2 (2017) | Implementation of the process approach to managing risks of information security in the NIST documents | Abstract |
Yuliia Kozhedub | ||
Vol 5, No 2 (2017) | Use of DNSSec technology for domain names protection in the ukrainian segment of the Internet | Abstract |
Vitalii Zubok | ||
Vol 4, No 2 (2016) | Statistical reliability of noise hindrance for ensuring protection against leakage of information through technical channels | Abstract PDF |
Serhii Ivanchenko, Vitalii Bezshtanko, Oleksii Havrylenko | ||
Vol 4, No 2 (2016) | Method for rules forming of incidents extrapolation for network-centric information and telecommunication systems monitoring | Abstract |
Petro Pavlenko, Mykola Vinohradov, Serhii Hnatiuk, Andrii Hizun, Viktor Hnatiuk | ||
Vol 4, No 2 (2016) | The system of providing authorship protection for digital photo | Abstract |
Ihor Yakoviv, Andrii Davydiuk, Ihor Kulykivskyi | ||
Vol 7, No 1 (2019) | Communication system information resource security breach model | Abstract |
Serhii Salnyk, Anton Storchak, Artem Mykytiuk | ||
Vol 7, No 2 (2019) | Conceptual basis of description for the information security management system architecture | Abstract |
Volodymyr Mokhor, Vasyl Tsurkan | ||
Vol 6, No 1 (2018) | Streaming clustering algorithm for monitoring and condition's diagnostics of technical real-time systems | Abstract |
Dmytro Sharadkin | ||
Vol 7, No 2 (2019) | Information security aspects of business continuity management | Abstract |
Nataliia Kukharska, Orest Polotai | ||
0 - 0 of 22 Items | > >> |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"