Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 13 No. 2 (2025)
Vol. 13 No. 2 (2025)
Published:
2025-11-27
CRYPTOLOGY
Mathematical modeling of intellectual and cryptographic protection of authentication keys
Yevhen Zhyvylo, Yurii Kuchma
162-177
PDF (Українська)
Mathematical aspects of the combined application of the AES algorithm and steganographic methods in authentication key protection
Tatiana Fesenko, Yuliya Kalashnikova
178-191
PDF (Українська)
NETWORK AND APPLICATION SECURITY
Risk assessment and analysis for threats and vulnerabilities of the corporate infrastructure information system
Serhii Smirnov, Viktoriia Polutsyhanova
192-203
PDF
Selection of algorithms and data structures for secure storage and processing of metadata in IoT systems based on the Ethereum blockchain
Ivan Zarudny, Volodymyr Lyubchak
204-215
PDF (Українська)
Algorithm for tracking violators in multi-address key distribution schemes
Valerii Zakusilo, Serhii Koniushok
216-224
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Model of assessment of the security of information and communication systems based on fuzzy visions
Igor Samoilov, Mykola Konotopets, Anton Storchak, Serhii Sholokhov
225-235
PDF (Українська)
Сyber threat information intelligence integration models
Ihor Yakoviv, Dmytro Sharadkin, Vasyl Kulikov
236-252
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN THE CYBERSECURITY FIELD
Method of using artificial intelligence for creating and reverse engineering graphical software models
Volodymyr Sokolov
253-263
PDF (Українська)
No-code approach to building semantic networks by means of prompt engineering
Dmytro Lande, Oleksandr Rybak
264-278
PDF (Українська)
Intelligent system for monitoring the information space of news about artificial intelligence
Viacheslav Riabtsev, Yurii Marchuk
279-289
PDF
Methods of intellectual support for decision-making in control systems of programmed mobile radio communication tools
Vladyslav Hol, Serhii Salnyk, Sergii Ivanchenko
290-299
PDF (Українська)
Adaptive AI architecture for implementing privacy-by-design in accordance with GDPR
Oleksii Shamov
300-309
PDF
AI-based image steganalysis under limited computational resources
Oleksandr Uspenskyi, Yurii Bondarchuk
310-320
PDF
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Using the sequential procedures method for coordination of target functions of node control systems in MANET radio networks
Kateryna Lukina
321-333
PDF (Українська)
Method for calculating the possibility of attacks in a MANET under uncertainty conditions
Volodymyr Akhramovych, Vadym Akhramovych
334-345
PDF (Українська)
Management of information and security events of a mobile cellular network using a digital twin
Іеvgen Samborskyі
346-356
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians