Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 1 No. 1 (2012)
Vol. 1 No. 1 (2012)
Published:
2012-06-30
A new look at the concept of "weapons of mass destruction"
Aleksandr Bohdanov
07-15
PDF (Русский)
Determinating shortest paths from one vertex using an algorithm of breadth-first search
Stepan Vynnychuk
16-20
PDF (Русский)
Speech recognition in artificial intelligence systems
Oleh Berdnykov, Kostiantyn Bohush, Yurii Bohush
21-24
PDF (Українська)
Detecting abnormal behavior of users of computer systems using artificial neural networks
Vasyl Kulikov, Oleksandr Ivashchenko, Oleksandr Kozlov
25-30
PDF (Українська)
Relationship of information and signs
Ihor Yakovyv
31-41
PDF (Русский)
Optimum demodulation of digital signal, that observed on the background of similar powerful obstacle
Viktor Yerokhin, Yevhen Peleshok
42-53
PDF (Українська)
Graph-analytical model of group search of defects while repairing the equipment of special communication
Vadym Romanenko
53-61
PDF (Українська)
Diagnostic model of digital radioelectronic component of special communications equipment
Mykola Zherdiev, Lev Sakovych, Serhii Hlukhov, Pavlo Popov
62-68
PDF (Українська)
Analytical model of assessment of message processing time in the management of telecommunications networks
Mykola Nesterenko, Oleksandr Romanov, Oleksandr Uspenskyi
69-75
PDF (Українська)
Model of failures of modern information and telecommunication networks for predicting control at the services management level
Valerii Lipivskyi
76-82
PDF (Українська)
Approach to building inspection tests of digital devices on extra large integrated circuits
Vasyl Kulikov
83-92
PDF (Українська)
Maliciously created hardware
Anatolii Serhiienko
93-100
PDF (Українська)
Detecting computer attacks in information and telecommunication systems on the basis of inductive forecasting
Serhii Liventsev, Anton Storchak
100-104
PDF (Українська)
Organization of secure exchange of SOAP-messages between ASP.NET Web-service and Web-application using block encryption algorithm AES
Serhii Liubarskyi, Petro Shatsilo
105-114
PDF (Українська)
Using WMI technologies to ensure the integrity and confidentiality of scenarios in problems of automation of processes of managing Windows operating systems
Nestor Melnyk, Sviatoslav Parshukov
115-123
PDF (Українська)
Features of using tablet computers Apple IPad 2 to protect confidential information in distributed information and telecommunication systems
Serhii Anpilohov, Andrii Voloshyn
123-132
PDF (Русский)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians