Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 5 No. 2 (2017)
Vol. 5 No. 2 (2017)
Published:
2017-12-30
INFORMATION TECHNOLOGY
Scenario research based on analysis of information space
Dmytro Lande, Andrii Boichenko
5-12
PDF (Українська)
INFORMATION WARFARE
Negative information-psychological impact on individual consciousness based on socio-engineering approach
Volodymyr Mokhor, Oksana Tsurkan
13-19
PDF (Українська)
CRYPTOLOGY
Methods of statistical tests independence verification
Liudmyla Kovalchuk, Nataliia Kuchynska
20-32
PDF (Українська)
NETWORK AND APPLICATION SECURITY
The virtual private networks protocols: features of creation and perspective of development
Artem Zhylin, Serhii Valovyi, Dmytro Marynin
33-42
PDF (Українська)
Use of DNSSec technology for domain names protection in the ukrainian segment of the Internet
Vitalii Zubok
43-50
PDF (Українська)
MATHEMATICAL AND COMPUTER MODELING
Architecture of software based on integrated objects
Volodymyr Sokolov
51-59
PDF (Українська)
Set-theoretical approach to defining of terms “classification”, “taxonomy” and “ontology”
Hryhoriy Kravtsov, Oleksandr Dolhorukov, Volodymyr Koshel
59-66
PDF (Українська)
СOMPUTATIONAL METHODS
Improvement of the quadratic sieve method on the basis of the extended factor base and using available quantity of B – smooth numbers
Stepan Vynnychuk, Vitalii Misko
67-75
PDF (Українська)
INFORMATION SECURITY RISK MANAGEMENT
Implementation of the process approach to managing risks of information security in the NIST documents
Yuliia Kozhedub
76-89
PDF (Українська)
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
A comparison enterprise architecture frameworks for critical IT infrastructure design
Yaroslav Dorohyi, Vasyl Tsurkan, Serhii Telenyk, Olena Doroha-Ivaniuk
90-118
PDF
Method of object identification of critical information infrastructure in aviation industry
Serhii Hnatiuk, Viktoriia Sydorenko, Vasyl Kinzeriavyi
119-134
PDF (Українська)
Information-telecommunication system, conceptual model of cyberspace and cybersecurity
Ihor Yakoviv
134-144
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Model of detecting cybernetic attacks on information-telecommunication systems based on description of anomalies in their work by weighed fuzzy rules
Ihor Subach, Vitalii Fesokha
145-152
PDF (Українська)
Method of adaptive spatial coding of signals for non-stationary frequency-selective channels of wireless communication
Liudmyla Pohrebniak, Mykola Naumenko
153-165
PDF (Українська)
Using of regression analysis methods for monitoring and managing telecommunication systems
Ruslan Abduramanov, Yurii Khlaponin, Anton Khaddad
165-171
PDF (Русский)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians