Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Purpose and Objectives
Scientific Profile of the Publication
Thematic Sections of the Scientific Collection
Publication Frequency
Privacy Statement
Journal policies
Academic Integrity Policy
Reviewing
Open Access Policy and Terms of Use of Copyrighted Materials
AI Usage Policy
Data sharing policy
Archiving policy
Policy on Obtaining a Mandatory Conclusion
Complaints Procedure
Retraction Policy
Publication Fee
Editorial Team
Editorial Team
Editorial Board Members
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 9 No. 2 (2021)
Vol. 9 No. 2 (2021)
Published:
2021-12-30
INFORMATION TECHNOLOGY
Methods and approaches analysis of artificial intelligence designing for real time strategy game
Yaroslav Dorohyi, Oleksandr Svyrydenko
128-136
PDF
INFORMATION SECURITY
Сomparative analysis of algorithms for change points detection in regression models of time series
Viacheslav Riabtsev, Dmytro Sharadkin, Yurii Kliat
137-150
PDF (Українська)
Conceptual model of information protection of critical information infrastructure objects of Ukraine
Yuliia Kozhedub, Serhii Vasylenko, Andrii Maksymets, Vira Hyrda
151-164
PDF (Українська)
INFORMATION WARFARE
Deception Technology: architecture and classification
Artem Zhylin, Olha Shevchuk
165-175
PDF (Українська)
NETWORK AND APPLICATION SECURITY
Way of determining APT control channel
Ihor Yakoviv, Andrii Trokhymenko, Kyrylo Hlum
176-188
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Approach to diagnosing a digital devices on a complete verification test
Vasyl Kulikov, Oleksandr Uspenskyi, Andrii Zhuravel, Mykola Zhuravel
189-199
PDF (Українська)
INFORMATION SECURITY RISK MANAGEMENT
Functional model of reverse engineering malware
Vasyl Tsurkan, Dmitry Voloshin
200-208
PDF (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
OSINT investigation to detect and prevent cyber attacks and cyber security incidents
Oleksandr Puchkov, Dmytro Lande, Ihor Subach, Mykhailo Boliukh, Dmytro Nahornyi
209-218
PDF
Analysis of key factors of formation of the system of competences of professionals in the field of cybersecurity
Viktor Horlynskyi, Borys Horlynskyi
219-231
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Method of construction of protected data transmission channels using modified neural network
Inna Kal’chuk, Tetiana Laptieva, Nataliia Lukova-Chuiko, Yurii Kharkevych
232-243
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians