Issue Title
Vol 6, No 2 (2018) Risk assessment presentation of information security by the risks map Abstract
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan
Vol 4, No 1 (2016) Implementation of information security management system in organization Abstract  PDF
Vitalii Bezshtanko, Oleksandr Makarevych
Vol 7, No 2 (2019) Cybersecurity as a component of information security of Ukraine Abstract
Viktor Horlynskyi, Borys Horlynskyi
Vol 6, No 1 (2018) Аnalysis of information security risk assessment representation methods Abstract
Volodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan
Vol 7, No 2 (2019) Problems of protection of informational resources when using cloud technologies Abstract
Artem Zhylin, Andrii Divitskyi, Anna Kozachok
Vol 4, No 1 (2016) Analyzing of eligibility of complex risks of information security by analytical geometry methods Abstract
Volodymyr Mokhor, Oleksandr Bakalynskyi, Oleksandr Bohdanov, Vasyl Tsurkan
Vol 6, No 2 (2018) Functional model of information security systems Abstract
Yuliia Kozhedub
Vol 6, No 1 (2018) Organizational paradigm for providing of information security Abstract
Yuliia Kozhedub
Vol 4, No 2 (2016) Use of entropy approach for information security risks assessment Abstract
Volodymyr Mokhor, Vasyl Tsurkan, Yaroslav Dorohyi, Serhii Mykhailov, Oleksandr Bakalynskyi, Heorhii Krykhovetskyi, Ihor Bohdanov
Vol 4, No 2 (2016) Decreasing the total number of logic elements in the classis two-step multiplier with a help of Vivado HLS Abstract
Olha Sholohon, Yuliia Sholohon
Vol 4, No 1 (2016) Anomaly detection system for mobile carrier based on Big Data concept Abstract
Serhii Bondarovets, Oksana Koval, Serhii Hnatiuk
Vol 5, No 2 (2017) Implementation of the process approach to managing risks of information security in the NIST documents Abstract
Yuliia Kozhedub
Vol 5, No 2 (2017) Use of DNSSec technology for domain names protection in the ukrainian segment of the Internet Abstract
Vitalii Zubok
Vol 4, No 2 (2016) Statistical reliability of noise hindrance for ensuring protection against leakage of information through technical channels Abstract  PDF
Serhii Ivanchenko, Vitalii Bezshtanko, Oleksii Havrylenko
Vol 4, No 2 (2016) Method for rules forming of incidents extrapolation for network-centric information and telecommunication systems monitoring Abstract
Petro Pavlenko, Mykola Vinohradov, Serhii Hnatiuk, Andrii Hizun, Viktor Hnatiuk
Vol 4, No 2 (2016) The system of providing authorship protection for digital photo Abstract
Ihor Yakoviv, Andrii Davydiuk, Ihor Kulykivskyi
Vol 7, No 1 (2019) Communication system information resource security breach model Abstract
Serhii Salnyk, Anton Storchak, Artem Mykytiuk
Vol 7, No 2 (2019) Conceptual basis of description for the information security management system architecture Abstract
Volodymyr Mokhor, Vasyl Tsurkan
Vol 6, No 1 (2018) Streaming clustering algorithm for monitoring and condition's diagnostics of technical real-time systems Abstract
Dmytro Sharadkin
Vol 7, No 2 (2019) Information security aspects of business continuity management Abstract
Nataliia Kukharska, Orest Polotai
0 - 0 of 22 Items > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"