Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 4 No. 2 (2016)
Vol. 4 No. 2 (2016)
Published:
2016-12-30
INFORMATION TECHNOLOGY
Nonlinear properties of agent-based news distribution model
Dmytro Lande, Vadym Dodonov
137-146
PDF (Русский)
Сonstruction of multilevel multiagent information systems based on knowledge
Oleksii Kovalenko
146-154
PDF (Українська)
The main statements of ontology theory and its implementation in the system of legal knowledge
Serhii Kosenko
154-171
PDF (Українська)
INFORMATION SECURITY
Building protection systems on the basis of information multilevel hierarchical model
Serhii Toliupa, Oleksandr Uspenskyi
172-181
PDF (Русский)
The system of providing authorship protection for digital photo
Ihor Yakoviv, Andrii Davydiuk, Ihor Kulykivskyi
182-189
PDF (Українська)
Method for rules forming of incidents extrapolation for network-centric information and telecommunication systems monitoring
Petro Pavlenko, Mykola Vinohradov, Serhii Hnatiuk, Andrii Hizun, Viktor Hnatiuk
189-199
PDF (Українська)
Сollection, processing, use and protection of information in the documents of high social significance
Yuliia Kozhedub, Tetiana Lisnichenko
199-206
PDF (Українська)
Statistical reliability of noise hindrance for ensuring protection against leakage of information through technical channels
Serhii Ivanchenko, Vitalii Bezshtanko, Oleksii Havrylenko
207-215
PDF
INFORMATION WARFARE
Mathematical model of information influence on the interaction contractor
Mykola Kubiavka
216-222
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Hardware-software realisation of the generator of subkey based on the cellular automata
Stepan Bilan, Andrii Demash
223-235
PDF (Українська)
Decreasing the total number of logic elements in the classis two-step multiplier with a help of Vivado HLS
Olha Sholohon, Yuliia Sholohon
235-243
PDF (Українська)
СOMPUTATIONAL METHODS
Formation of non-uniformity increment for the basic module base in the problem of Fermat’s factorization method
Stepan Vynnychuk, Yevhen Maksymenko
244-254
PDF (Русский)
INFORMATION SECURITY RISK MANAGEMENT
Use of entropy approach for information security risks assessment
Volodymyr Mokhor, Vasyl Tsurkan, Yaroslav Dorohyi, Serhii Mykhailov, Oleksandr Bakalynskyi, Heorhii Krykhovetskyi, Ihor Bohdanov
255-261
PDF (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Аnalysis of the factors influencing condition cybersecurity of information system of object of the critical infrastructure
Serhii Honchar, Hennadii Leonenko
262-268
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Method of solving problem for information resources distribution in ACS special purpose in the amount of information blocks variability
Ihor Subach, Oleksandr Chauzov, Nina Kuchuk
269-276
PDF (Українська)
Rationale method of prior diagnostic modules development of technical support modular prospective hardware for special communications means
Lev Sakovych, Vadym Romanenko, Ihor Hyrenko
276-285
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians