Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Purpose and Objectives
Scientific Profile of the Publication
Thematic Sections of the Scientific Collection
Publication Frequency
Privacy Statement
Journal policies
Academic Integrity Policy
Reviewing
Open Access Policy and Terms of Use of Copyrighted Materials
AI Usage Policy
Data sharing policy
Archiving policy
Policy on Obtaining a Mandatory Conclusion
Complaints Procedure
Retraction Policy
Publication Fee
Editorial Team
Editorial Team
Editorial Board Members
Current
Archives
Подання
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 8 No. 2 (2020)
Vol. 8 No. 2 (2020)
Published:
2020-12-30
INFORMATION TECHNOLOGY
Ontological approach to big data analytics in cybersecurity domain
Anatoly Gladun, Katerina Khala, Ihor Subach
120-132
pdf
INFORMATION SECURITY
Volume increasing of secret message in a fixed graphical stego container based on intelligent image analysis
Stepan Bilan, Viacheslav Riabtsev, Andriy Daniltso
133-143
pdf
Influence of destabilizing factors on the stability of user's handwritten signature indicators
Viktor Yevetskyi, Ivan Horniichuk, Hanna Nakonechna
144-152
pdf (Українська)
INFORMATION WARFARE
Building of knowledge bases of decision support systems using the directed networks of terms during information operations research
Dmytro Lande, Oleh Andriichuk, Oleh Dmytrenko, Vitaliy Tsyganok, Yaroslava Porplenko
153-163
pdf (Українська)
CRYPTOLOGY
BKW-attack on NTRUCIPHER and NTRUCIPHER+ encryption schemes
Alexandra Matiyko
164-176
pdf (Українська)
NETWORK AND APPLICATION SECURITY
Requirements for web applications firewalls
Artem Zhylin, Dmytro Parfeniuk, Sergii Mitin
177-190
pdf (Українська)
MATHEMATICAL AND COMPUTER MODELING
Information, signs, knowledge and intelligence
Ihor Yakoviv
191-215
pdf
INFORMATION SECURITY RISK MANAGEMENT
Approach of the information properties destruction risks assessing based on the color scale
Volodymyr Mokhor, Andrii Davydiuk
216-223
pdf (Українська)
Interpretation model of assessments boundary information security risks
Vitalii Bezshtanko, Yaroslav Zinchenko
224-231
pdf (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Determination of components of route hijack risk by Internet connections topology analysis
Vitalii Zubok
232-239
pdf
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians