Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Search
Search
Search articles for
Advanced filters
Published After
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Advanced filters
Keyword
monitoring
Löschen
Search
Order results by:
Relevance
Author
Issue
Publication Date
Article Title
Ascending
Descending
0 - 0 of 13 items
Availability government web resources monitoring system
Oleksii Misnik, Mykhailo Antonishyn
54-61
2016-06-30
Features of construction systems of distributed content-monitoring of global information networks
Dmytro Lande, Yaroslav Kondratenko
5-11
2017-06-30
The approach to automated detection of destructive cyber influences
Yurii Danyk, Kostiantyn Sokolov, Oleh Hudyma
149-160
Using EBPF to identify ransomware that use DGA DNS queries
Danyil Zhuravchak, Eduard Kiiko, Valeriy Dudykevych
166-174
2023-12-28
Method for rules forming of incidents extrapolation for network-centric information and telecommunication systems monitoring
Petro Pavlenko, Mykola Vinohradov, Serhii Hnatiuk, Andrii Hizun, Viktor Hnatiuk
189-199
2016-12-31
Corporate system of network information resources monitoring based on multi-agent approach
Dmytro Lande, Vadym Dodonov, Taras Kovalenko
5-12
2016-06-30
System for analysing of big data on cybersecurity issues from social media
Dmytro Lande, Oleksandr Puchkov, Ihor Subach
4-18
2020-07-09
Using data from open sources for decision-making under information warfare
Vitaliy Tsyganok, Sergii Kadenko, Oleh Andriichuk
35-48
2019-06-30
Use of special software for analysis of the information aggression of the Russian Federation against Ukraine
Valentyn Petryk, Andrii Davydiuk
21-28
2017-06-30
A model of the space of thematic telegram channels based on contextual links
Oleksandr Puchkov, Dmytro Lande, Ihor Subach
151-161
2024-12-26
Methodology for creating, clustering and visualizing correlation networks determined by the dynamics of thematic information flows
Oleksandr Puchkov, Dmytro Lande, Ihor Subach
6-16
2025-05-20
Integration of information search technologies and artificial intelligence in the field of cybersecurity
Oleksandr Puchkov, Dmytro Lande, Ihor Subach, Oleksandr Rybak
206-215
2023-12-28
Streaming clustering algorithm for monitoring and condition's diagnostics of technical real-time systems
Dmytro Sharadkin
59-74
2018-06-30
0 - 0 of 13 items
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians