Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 8 No. 2 (2020)
Vol. 8 No. 2 (2020)
Published:
2020-12-30
INFORMATION TECHNOLOGY
Ontological approach to big data analytics in cybersecurity domain
Anatoly Gladun, Katerina Khala, Ihor Subach
120-132
pdf
INFORMATION SECURITY
Volume increasing of secret message in a fixed graphical stego container based on intelligent image analysis
Stepan Bilan, Viacheslav Riabtsev, Andriy Daniltso
133-143
pdf
Influence of destabilizing factors on the stability of user's handwritten signature indicators
Viktor Yevetskyi, Ivan Horniichuk, Hanna Nakonechna
144-152
pdf (Українська)
INFORMATION WARFARE
Building of knowledge bases of decision support systems using the directed networks of terms during information operations research
Dmytro Lande, Oleh Andriichuk, Oleh Dmytrenko, Vitaliy Tsyganok, Yaroslava Porplenko
153-163
pdf (Українська)
CRYPTOLOGY
BKW-attack on NTRUCIPHER and NTRUCIPHER+ encryption schemes
Alexandra Matiyko
164-176
pdf (Українська)
NETWORK AND APPLICATION SECURITY
Requirements for web applications firewalls
Artem Zhylin, Dmytro Parfeniuk, Sergii Mitin
177-190
pdf (Українська)
MATHEMATICAL AND COMPUTER MODELING
Information, signs, knowledge and intelligence
Ihor Yakoviv
191-215
pdf
INFORMATION SECURITY RISK MANAGEMENT
Approach of the information properties destruction risks assessing based on the color scale
Volodymyr Mokhor, Andrii Davydiuk
216-223
pdf (Українська)
Interpretation model of assessments boundary information security risks
Vitalii Bezshtanko, Yaroslav Zinchenko
224-231
pdf (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Determination of components of route hijack risk by Internet connections topology analysis
Vitalii Zubok
232-239
pdf
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians