Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
45
YesterdayYesterday
1674
This weekThis week
11245
Last WeekLast week
13850
This monthThis month
7740
Last monthLast month
50787
All daysAll days
5834813

Cybersecurity: Education, Science, Technique

Number 5, 2019

  • 6-15
    RESEARCH OF MAIN TRENDS OF MODERN WEB SITES DEVELOPMENT
    Authors: Nataliia Kotenko, Tetiana Zhyrova, Vitalii Chybaievskyi, Alona Desiatko
    Number of views: 338
  • 16-30
    COMPARATIVE BANDWIDTH ANALYSIS OF LOW-POWER WIRELESS IOT-SWITCHES
    Authors: Volodymyr Sokolov, Bohdan Vovkotrub, Yevhen Zotkin
    Number of views: 161
  • 31-39
    MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY
    Authors: Svitlana Shevchenko, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, Kateryna Kravchuk
    Number of views: 206
  • 40-51
    MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM
    Authors: Alla Havrylova, Olha Korol, Stanyslav Milevskyi, Lala Bakirova
    Number of views: 187
  • 53-60
    CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE
    Authors: Zoreslava Brzhevska, Nadiia Dovzhenko, Halyna Haidur, Andriy Anosov
    Number of views: 378
  • 61-72
    DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 1
    Authors: Yurii Borsukovskyi
    Number of views: 179
  • 73-82
    PROTECTED CABLE INTERFACES OF THE SENSORY NETWORKS OF THINGS INTERNET.
    Authors: Vadym Abramov
    Number of views: 218
  • 83-94
    STATISTICAL CRITERIA FOR ASSESSING THE INFORMATIVITY OF THE SOURCES OF RADIO EMISSION OF TELECOMMUNICATION NETWORKS AND SYSTEMS IN THEIR RECOGNITION
    Authors: Anatolii Ilnitskiy, Oleg Burba
    Number of views: 171
  • 95-104
    THE RESEARCH TO THE ROBUSTNESS OF RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING TO INFORMATION ATTACKS
    Authors: Yelyzaveta Meleshko, Vitaliy Khokh, Oleksandr Ulichev
    Number of views: 211

Number 4, 2019

  • 6-13
    ANALYSIS OF THE STATE OF CYBER SECURITY IN THE LEADING COUNTRIES OF THE WORLD
    Authors: Yurii I. Khlaponin, Svitlana V. Kondakova, Yevheniia Ye. Shabala, Liliia P. Yurchuk, Pavlo S. Demianchuk
    Number of views: 218
  • 14-23
    A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM
    Authors: Ruslan Hryshchuk, Olga Hryshchuk
    Number of views: 170
  • 24-31
    APPLICATION OF COMBINED MODELS OF COMPUTER NETWORKS IN THE TRAINING PROCESS
    Authors: Vadym Abramov
    Number of views: 213
  • 32-43
    INCREASING THE SWITCHING RATE OF THE AND AND OR LOGICAL OPERATIONS BASED ON JOSEPHSON JUNCTIONS
    Authors: Mykhailo Tyhanskyi, Andrii Partyka, Rostyslaw Krysko
    Number of views: 194
  • 44-53
    APPLICATION OF THE SECURITY.CRYPTOGRAPHY CLASS LIBRARY FOR PRACTICAL TRAINING OF SPECIALISTS FROM THE CYBER SECURITY
    Authors: Yulia Zhdanovа, Svitlana Spasiteleva, Svitlana Shevchenko
    Number of views: 169
  • 54-61
    THE RESEARCH OF PROBLEMS OF THE INFORMATION ALGORITHM FUNCTIONING IN THE PRESENCE OF PRESERVED NODES IN WIRELESS SENSOR NETWORKS
    Authors: Andrii Bondarchuk, Zoreslava Brzhevska, Nadiia Dovzhenko, Anatoliy Makarenko, Valentin Sobchuk
    Number of views: 127
  • 62-71
    ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE
    Authors: Svitlana Shevchenko, Pavlo Skladannyi, Maksym Martseniuk
    Number of views: 153
  • 72-84
    GENERALIZING GABOR FILTERS BASED ON ATEB-FUNCTIONS
    Authors: Mariya Nazarkevych, Yaroslav Voznyi, Oksana Troyan
    Number of views: 163
  • 85-89
    BLOCKCHAIN AS A COMPONENT OF INFORMATION SECURITY
    Authors: Anton Kulikovskyi
    Number of views: 197
  • 90-103
    RESULTS AND TOOLS FOR EVALUATING THE EFFECTIVENESS OF FOCUSING SYSTEMS TO IMPROVE ACCESSIBILITY IN WIRELESS NETWORKS
    Authors: Volodymyr Astapenya, Volodymyr Sokolov, Mahyar TajDini
    Number of views: 136

Number 3, 2019

  • 6-26
    RESEARCH OF STABILITY IN AD HOC SELF-ORGANIZATED WIRELESS NETWORKS
    Authors: Maksym Vladymyrenko, Volodymyr Sokolov, Volodymyr Astapenya
    Number of views: 138
  • 27-41
    METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTS
    Authors: Mariya Nazarkevych, Yaroslav Voznyi
    Number of views: 222
  • 42-52
    APPLICABLE ASPECTS OF AUTHENTICATION DATA PROTECTION
    Authors: Yurii Borsukovskyi, Victoria Borsukovska
    Number of views: 134
  • 53-62
    COMPLEX METHOD OF AUTOMATIC FONOSEMANTIC ANALYSIS OF TEXT INFORMATION ON THE BASIS OF EVALUATION OF HIGH SEMANTIC UNITS IN THE CONDITIONS OF INFORMATIVE CONTINUATION
    Authors: Volodymyr Barannik, Tatyana Belikova, Maksim Kapko, Irina Gurzhiy
    Number of views: 148
  • 63-87
    A METHOD OF FORMING OF ANTI-VIRUS PROTECTION OF DATA IS WITH THE USE OF SAFE ROUTING OF METADATAS
    Authors: Serhii Smirnov, Liudmyla Polishchuk, Tetiana Smirnova, Oksana Konoplitska-Slobodeniuk, Oleksii Smirnov
    Number of views: 154
  • 88-96
    INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES
    Authors: Zoreslava Brzhevska, Nadiia Dovzhenko, Roman Kyrychok, Galyna Gaidur, Andriy Anosov
    Number of views: 293
  • 97-103
    STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY
    Authors: Yanina Roy, Nataliia Mazur, Olena Riabchun
    Number of views: 119
  • 104-111
    METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES
    Authors: Vladyslav Yaskevych, Oleksandr Klochko
    Number of views: 167
  • 112-121
    ANALYSIS OF THE USE OF THE HIGHLY EFFECTIVE IMPLEMENTATION OF THE SHA-512 HASH FUNCTIONS FOR THE DEVELOPMENT OF SOFTWARE SYSTEMS
    Authors: Mykola Pasyeka, Nadiia Pasieka, Mykhaylo Bestylnyy, Vasyl Sheketa
    Number of views: 149
  • 122-133
    THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRY
    Authors: Volodymyr Pikh, Mykhaylo Bestylnyy, Vasyl Sheketa
    Number of views: 167

Number 2, 2018

  • 6-30
    GERT Models of Technology of Cloudy Anti-Virus Defense
    Authors: Oleksii A. Smirnov, Serhii A. Smirnov, Liudmyla I. Polishchuk, Oksana K. Konoplitska-Slobodeniuk, Tetyana V. Smirnova
    Number of views: 168
  • 31-46
    Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4–2.5 GHz
    Authors: Volodymyr Yu. Sokolov
    Number of views: 145
  • 47-67
    Classification of Cyber Cruise of Informational Resources of Automated Banking Systems
    Authors: Serhii Yevseiev, Khazail Rzayev, Tamilla Mammadova, Firuz Samedov, Nataliia Romashchenko
    Number of views: 262
  • 68-79
    Model of Investment Strategies of Transport Situational Centers in Cyber Security Systems
    Authors: Valerii A. Lakhno, Volodymyr P. Malyukov, Liubov D. Plyska
    Number of views: 151
  • 80-89
    Network-Centric Monitoring for Cyber Incidents in Sectors of Critical State Infrastructure
    Authors: Sergiy O. Gnatyuk, Vitaliy V. Kishchenko, Vitaliy V. Kotelianets, Madina Bauyrzhan
    Number of views: 135
  • 90-97
    Method of Efficient Representation and Protection of Dynamic Objects in Video Streams based on the Technology of Their Movement Compensation
    Authors: Volodymyr V. Barannik, Mykola V. Dvorsky, Valeriy V. Barannik, Anton D. Sorokun
    Number of views: 175
  • 98-104
    Virtual Laboratory for Modeling of Processes in Informational and Cyber Securities as a form of Forming Practical Skills of Students
    Authors: Volodymyr L. Buriachok, Svitlana M. Shevchenko, Pavlo M. Skladannyi
    Number of views: 132
  • 105-112
    Influence on Information Reliability as a Threat for the Information Space
    Authors: Zoreslava M. Brzhevska, Galyna I. Gaidur, Andriy O. Anosov
    Number of views: 260

Number 1, 2018

  • 6-16
    Method of Counteraction in Social Engineering on Information Activity Objectives
    Authors: Volodymyr Yu. Sokolov, Davyd M. Kurbanmuradov
    Number of views: 147
  • 17-25
    Terahertz Channel Radio Access for Complex System without Systems the Bell of the Objects
    Authors: Volodymyr Saiko, Volodymyr Nakonechnyi, Serhii Tolyupa, Serhii Dakov
    Number of views: 157
  • 26-34
    Practical Points for Information Security Considering Limited Financing
    Authors: Yurii V. Borsukovskyi, Victoria Y. Borsukovska
    Number of views: 172
  • 35-48
    Perspectives for Development of Block Chain Applications in Ukraine
    Authors: Svitlana O. Spasiteleva, Volodymyr L. Buriachok
    Number of views: 282
  • 49-55
    Application of Cloud-Based Learning Technologies in the Organization Students’ Research Work
    Authors: Dmytro Bodnenko, Nykyta Ostapenko
    Number of views: 116
  • 55-62
    Informative Safety of Unmanned Aviation Systems Radio Communication Channel
    Authors: Oleksii Mykhatskyi
    Number of views: 183
  • 63-72
    Mathematical Model of Information Security’s Threat Agent
    Authors: Yury Shcheblanin, Dmytro Rabchun
    Number of views: 118
  • 73-85
    Methodological Aspects of the Internet of Things Disciplines Study
    Authors: Vadym O. Abramov, Oksana S. Lytvyn
    Number of views: 165
  • 86-93
    Audit of Information Security is the basis of Effective Protection of the Enterprise
    Authors: Yanina Vl. Roy, Nataliia P. Mazur, Pavlo M. Skladannyi
    Number of views: 197
  • 94-104
    Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic
    Authors: Anatoliy V. Bessalov
    Number of views: 152


 В начало  Предыдущая страница  1 2
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us