Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 1 (2015)
Vol. 3 No. 1 (2015)
Published:
2015-06-30
INFORMATION TECHNOLOGY
Construction domain model of information security by probing Google Scholar Citations service
Dmitrii Lande
4-11
PDF (Русский)
Application of cloud technologies in constructing situation management systems
Oleksii Kovalenko
11-18
PDF (Українська)
INFORMATION SECURITY
About features of the system and process approaches creating ІТ projects in the field of information security
Yuliya Kozhedub
19-24
PDF (Українська)
INFORMATION WARFARE
Information component of hybrid war
Aleksander Bohdanov
25-30
PDF (Русский)
Methods hybrid war of Russia against Ukraine. Areas counter
Valentyn Petryk, Yurii Kanarskyi
30-37
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Novel pseudo-random sequence of numbers generator based cellular automata
Stepan Bilan, Mykola Bilan, Sergii Bilan
38-50
PDF
Simulation method of digital circuits with faults
Vasyl Kulikov, Vitalii Kravchuk
50-59
PDF (Русский)
INFORMATION SECURITY RISK MANAGEMENT
Analytical geometry approach for information security risks analyses
Volodymyr Mokhor, Vitalii Bezshtanko, Serhii Honchar, Hryhorii Kravtsov, Ihor Kotsiuba, Olha Kruk, Oleksander Makarevych, Yevhen Maksymenko, Vasyl Tsurkan
60-67
PDF
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
The base model of informational processes of management and safety criteria for cybernetic systems
Igor Yakoviv
68-74
PDF (Русский)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians