Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 13 No. 1 (2025)
Vol. 13 No. 1 (2025)
Published:
2025-05-20
INFORMATION TECHNOLOGY
Methodology for creating, clustering and visualizing correlation networks determined by the dynamics of thematic information flows
Oleksandr Puchkov, Dmytro Lande, Ihor Subach
6-16
PDF (Українська)
Machine learning methods for anomaly detection in the radio frequency spectrum: research methodology
Viacheslav Riabtsev, Pavlo Pavlenko
17-31
PDF
CRYPTOLOGY
Statistical attack on combination keystream generators with irregular clocking
Alexandra Matiyko, Anton Alekseychuk
32-42
PDF (Українська)
NETWORK AND APPLICATION SECURITY
Management of information and security events of computer systems using logical-dynamic models
Petro Pavlenko, Іеvgen Samborskyі
43-54
PDF (Українська)
Method for calculating the computer information protection index under conditions of uncertainty
Vadym Akhramovych, Volodymyr Akhramovych
55-68
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Discrete models of geometric objects in parallel computing systems
Anastasiia Kaliuzhniak, Oleksii Kudin
69-79
PDF (Українська)
Model of the route of the electronic communication network, taking into account the parameters of equipment condition monitoring
Iryna Kononova, Viktor Nekrutenko
80-88
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN THE CYBERSECURITY FIELD
Application of large language models for intelligent expansion of semantic networks
Dmytro Lande, Oleksandr Rybak
89-99
PDF (Українська)
Training a neural network to identify objects by parameters in non-overlapping spaces
Dmytro Evgrafov, Serhii Sholokhov
100-108
PDF
Model of knowledge presentation in mobile radio media decision support systems
Serhii Salnyk
109-117
PDF (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Сyberwar as a systemic challenge to Ukraine's cybersecurity
Viktor Horlynskyi, Borys Horlynskyi
118-133
PDF (Українська)
Impact of redundancy on the security of technical information leakage channels and approximate correction of the channel error probability
Sergii Ivanchenko, Vadym Yaroshchuk
134-144
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Requirements to point for autonomous access to information in a 4G mobile communications network
Yurii Chelpan, Valerii Stepanov
145-153
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians