Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Purpose and Objectives
Scientific Profile of the Publication
Thematic Sections of the Scientific Collection
Publication Frequency
Privacy Statement
Journal policies
Academic Integrity Policy
Reviewing
Open Access Policy and Terms of Use of Copyrighted Materials
AI Usage Policy
Data sharing policy
Archiving policy
Policy on Obtaining a Mandatory Conclusion
Complaints Procedure
Retraction Policy
Publication Fee
Editorial Team
Editorial Team
Editorial Board Members
Current
Archives
Подання
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 5 No. 1 (2017)
Vol. 5 No. 1 (2017)
Published:
2017-06-30
INFORMATION TECHNOLOGY
Features of construction systems of distributed content-monitoring of global information networks
Dmytro Lande, Yaroslav Kondratenko
5-11
PDF (Українська)
Technology of comprehensive rating estimation of performance of individual scientific activity of scientists
Oleh Dvorshchenko, Vasyl Kulikov, Tetiana Piatchanina
12-20
PDF (Українська)
INFORMATION WARFARE
Use of special software for analysis of the information aggression of the Russian Federation against Ukraine
Valentyn Petryk, Andrii Davydiuk
21-28
PDF (Українська)
NETWORK AND APPLICATION SECURITY
Analysis of existing solutions for preventing invasion in information and telecommunication networks
Igor Subach, Vitalii Fesokha, Nadiia Fesokha
29-41
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Сhange-point detection test based on the analysis of the time series' autocorrelation and its application for information security
Dmyto Sharadkin
42-54
PDF (Українська)
Аpplication of functional and relational models in object-oriented programming
Volodymyr Sokolov
54-63
PDF (Українська)
Semantic interoperability as a basis of meaningful analytics
Hryhorii Kravtsov
63-70
PDF
INFORMATION SECURITY RISK MANAGEMENT
Interpretation of the simple risk level dependence of its implementation in the terms of analytic geometry
Volodymyr Mokhor, Oleksandr Bakalynskyi, Oleksandr Bohdanov, Vasyl Tsurkan
71-82
PDF (Русский)
Analysis of cyber security risk management documents
Yuliia Kozhedub
82-95
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Complex analytical models for evaluating the efficiency of transport networks IP / MPLS
Mykola Nesterenko
96-106
PDF (Українська)
Minimization measurement requirements for maintenance and repair special communication means
Yevhen Ryzhov, Lev Sakovych
106-114
PDF
Perspective directions of scientific research in the area of technical exploitation of systems and means of special communication
Vladyslavl Hol, Serhii Hnatiuk, Vadym Romanenko, Ihor Hyrenko
114-123
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians