Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 3 No. 2 (2015)
Vol. 3 No. 2 (2015)
Published:
2015-12-30
INFORMATION TECHNOLOGY
Comparative evaluation of centrality criterion in a hierarchical network
Dmytro Lande, Olga Sulema
80-87
PDF (Українська)
INFORMATION SECURITY
Assessment of insider attack with learning statistics methods
Volodymyr Mokhor, Hryhorii Kravtsov, Ihor Kotsiuba
88-95
PDF
Create documentation for information security management systems
Yuliya Kozhedub
95-100
PDF (Українська)
Revealing channels of information leakage due to stray electromagnetic radiation and guidance by treating the spectrum microwave frequency
Yurii Khlaponin
100-107
PDF (Русский)
CRYPTOLOGY
Method for quality evaluation of trit pseudorandom sequence to cryptographic applications
Serhii Hnatiuk, Tetiana Zhmurko, Vasyl Kinzeriavyi, Nurhul Seilova
108-116
PDF (Українська)
NETWORK AND APPLICATION SECURITY
Detecting DDoS attack using MapReduce operations
Andrii Holovin
117-124
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Simulation software performance reliability special provision of communication
Serhii Hnatiuk, Oleksandr Korneiko
125-132
PDF (Українська)
Evaluation of certain signs and their collectively for individual recognition objects
Viktor Yevetskyi
132-137
PDF (Русский)
INFORMATION SECURITY RISK MANAGEMENT
Information security risk assessment based on spectral approach
Yevhen Maksymenko, Vasyl Tsurkan, Yaroslav Dorohyi, Olha Kruk
138-146
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Probability of intercept single hop transmitter with frequency hopping spread spectrum using search receiver
Serhii Vasylenko
147-151
PDF (Українська)
Research of multiplex signal of UAV management
Denys Bakhtiiarov
152-159
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians