Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Purpose and Objectives
Scientific Profile of the Publication
Thematic Sections of the Scientific Collection
Publication Frequency
Privacy Statement
Journal policies
Academic Integrity Policy
Reviewing
Open Access Policy and Terms of Use of Copyrighted Materials
AI Usage Policy
Data sharing policy
Archiving policy
Policy on Obtaining a Mandatory Conclusion
Complaints Procedure
Retraction Policy
Publication Fee
Editorial Team
Editorial Team
Editorial Board Members
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 8 No. 1 (2020)
Vol. 8 No. 1 (2020)
Published:
2020-07-09
INFORMATION TECHNOLOGY
System for analysing of big data on cybersecurity issues from social media
Dmytro Lande, Oleksandr Puchkov, Ihor Subach
4-18
pdf (Українська)
INFORMATION SECURITY
Selection of handwritten signature dynamic indicators for user authentication
Viktor Yevetskyi, Ivan Horniichuk
19-30
pdf
INFORMATION WARFARE
Method of vulnerabilities analysis of socio-technical systems to the social engineering influences
Rostyslav Herasymov, Olha Kruk, Oksana Tsurkan, Vadym Yashenkov
31-39
PDF (Українська)
Analysis of information-psychological impact detection methods in social networks
Valeriia Pokrovska
40-48
pdf (Українська)
NETWORK AND APPLICATION SECURITY
Mobile applications vulnerabilities testing model
Mykhailo Antonishyn
49-57
pdf
Applications containers security model
Oleksii Misnik
58-66
pdf
MATHEMATICAL AND COMPUTER MODELING
Mathematical model of multichannel discrete-continuous communication channel in conditions of influence of fluctuation noise and intentional interference
Vladyslav Hol, Oleksandr Ovcharov
67-81
pdf (Українська)
Discrete Markov model of information and communication processes for crowd formation
Valentyn Petryk, Yevhen Horondei
81-91
pdf (Українська)
INFORMATION SECURITY RISK MANAGEMENT
Method for conceptualizing system studies of information security management systems
Volodymyr Mokhor, Vasyl Tsurkan, Oleksandr Bakalynskyi, Yaroslav Dorohyi
92-101
PDF (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Analysis of the human factor influence on the cyber-physical system
Yuliia Kozhedub, Yuliia Kramska, Vira Hyrda
102-115
pdf (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians