Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
566
YesterdayYesterday
2118
This weekThis week
10092
Last WeekLast week
13850
This monthThis month
6587
Last monthLast month
50787
All daysAll days
5833660

Cybersecurity: Education, Science, Technique

Number 6, 2019

  • 6-18
    SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS
    Authors: Olexander Belej, Lohutova Tamara
    Number of views: 299
  • 19-31
    DECENTRALIZED IDENTITY AND CERTIFICATION SYSTEM
    Authors: Oleksandr Kurbatov, Pavlo Kravchenko, Nikolay Poluyanenko, Oleksiy Shapoval, Tetiana Kuznetsova
    Number of views: 220
  • 32-45
    IMPLEMENTATION OF XTEA ENCRYPTION PROTOCOL BASED ON IEEE 802.15.4 WIRELESS SYSTEMS
    Authors: Davyd Kurbanmuradov, Volodymyr Sokolov, Volodymyr Astapenya
    Number of views: 241
  • 46-56
    SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES
    Authors: Svitlana Kuznichenko, Iryna Buchynska
    Number of views: 271
  • 57-70
    MODEL FOR SUPPORTING DECISIONS OF A GROUP OF A SMART CITY PROJECT INVESTORS, TAKING INTO CONSIDERATION MULTIFACTORIALITY
    Authors: Valeriy Lakhno, Volodymyr Malukov, Dmytro Kasatkin, Andriy Blozva, Taras Litovchenko
    Number of views: 228
  • 71-81
    TESTING THE SECURITY ESP32 INTERNET OF THINGS DEVICES
    Authors: Oleksii Barybin, Elina Zaitseva, Volodymyr Brazhnyi
    Number of views: 333
  • 82-93
    SECURE SOFTWARE DEVELOPING RECOMMENDATIONS
    Authors: Viktoria Grechko, Tetiana Babenko, Larysa Myrutenko
    Number of views: 351
  • 94-104
    GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX
    Authors: Banovsha Mekhdiyeva, Guluzade Rustam, Liliia Ivanova, Natalia Korshun, Pavlo Skladannyi
    Number of views: 256
  • 105-111
    DEVELOPMENT OF OBJECT MOVEMENT ALGORITHM BY THE NEURAL NETWORK FOR THE CCTV SYSTEM
    Authors: Vitaliy Petlitsky, Svitlana Shevchenko, Nataliia Mazur
    Number of views: 247
  • 112-121
    DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 2
    Authors: Yurii Borsukovskyi
    Number of views: 244
  • 122-133
    SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS
    Authors: Svitlana Spasiteleva, Yulia Zhdanovа, Ivan Chychkan
    Number of views: 383
  • 134-141
    METHODS OF SAFETY DOMESTIC SECURITY
    Authors: Anastasia Belova, Viktoria Onischenko
    Number of views: 266
  • 142-153
    GENERATION OF GABOR FILTERS BASED ON ATEB FUNCTIONS
    Authors: Maria Nazarkevich, Yaroslav Vozny
    Number of views: 295

Number 5, 2019

  • 6-15
    RESEARCH OF MAIN TRENDS OF MODERN WEB SITES DEVELOPMENT
    Authors: Nataliia Kotenko, Tetiana Zhyrova, Vitalii Chybaievskyi, Alona Desiatko
    Number of views: 337
  • 16-30
    COMPARATIVE BANDWIDTH ANALYSIS OF LOW-POWER WIRELESS IOT-SWITCHES
    Authors: Volodymyr Sokolov, Bohdan Vovkotrub, Yevhen Zotkin
    Number of views: 159
  • 31-39
    MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY
    Authors: Svitlana Shevchenko, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, Kateryna Kravchuk
    Number of views: 205
  • 40-51
    MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM
    Authors: Alla Havrylova, Olha Korol, Stanyslav Milevskyi, Lala Bakirova
    Number of views: 186
  • 53-60
    CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE
    Authors: Zoreslava Brzhevska, Nadiia Dovzhenko, Halyna Haidur, Andriy Anosov
    Number of views: 377
  • 61-72
    DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 1
    Authors: Yurii Borsukovskyi
    Number of views: 178
  • 73-82
    PROTECTED CABLE INTERFACES OF THE SENSORY NETWORKS OF THINGS INTERNET.
    Authors: Vadym Abramov
    Number of views: 217
  • 83-94
    STATISTICAL CRITERIA FOR ASSESSING THE INFORMATIVITY OF THE SOURCES OF RADIO EMISSION OF TELECOMMUNICATION NETWORKS AND SYSTEMS IN THEIR RECOGNITION
    Authors: Anatolii Ilnitskiy, Oleg Burba
    Number of views: 170
  • 95-104
    THE RESEARCH TO THE ROBUSTNESS OF RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING TO INFORMATION ATTACKS
    Authors: Yelyzaveta Meleshko, Vitaliy Khokh, Oleksandr Ulichev
    Number of views: 210

Number 4, 2019

  • 6-13
    ANALYSIS OF THE STATE OF CYBER SECURITY IN THE LEADING COUNTRIES OF THE WORLD
    Authors: Yurii I. Khlaponin, Svitlana V. Kondakova, Yevheniia Ye. Shabala, Liliia P. Yurchuk, Pavlo S. Demianchuk
    Number of views: 217
  • 14-23
    A GENERALIZED MODEL OF FREDHOLM'S CRYPTOSYSTEM
    Authors: Ruslan Hryshchuk, Olga Hryshchuk
    Number of views: 169
  • 24-31
    APPLICATION OF COMBINED MODELS OF COMPUTER NETWORKS IN THE TRAINING PROCESS
    Authors: Vadym Abramov
    Number of views: 212
  • 32-43
    INCREASING THE SWITCHING RATE OF THE AND AND OR LOGICAL OPERATIONS BASED ON JOSEPHSON JUNCTIONS
    Authors: Mykhailo Tyhanskyi, Andrii Partyka, Rostyslaw Krysko
    Number of views: 193
  • 44-53
    APPLICATION OF THE SECURITY.CRYPTOGRAPHY CLASS LIBRARY FOR PRACTICAL TRAINING OF SPECIALISTS FROM THE CYBER SECURITY
    Authors: Yulia Zhdanovа, Svitlana Spasiteleva, Svitlana Shevchenko
    Number of views: 168
  • 54-61
    THE RESEARCH OF PROBLEMS OF THE INFORMATION ALGORITHM FUNCTIONING IN THE PRESENCE OF PRESERVED NODES IN WIRELESS SENSOR NETWORKS
    Authors: Andrii Bondarchuk, Zoreslava Brzhevska, Nadiia Dovzhenko, Anatoliy Makarenko, Valentin Sobchuk
    Number of views: 126
  • 62-71
    ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE
    Authors: Svitlana Shevchenko, Pavlo Skladannyi, Maksym Martseniuk
    Number of views: 152
  • 72-84
    GENERALIZING GABOR FILTERS BASED ON ATEB-FUNCTIONS
    Authors: Mariya Nazarkevych, Yaroslav Voznyi, Oksana Troyan
    Number of views: 162
  • 85-89
    BLOCKCHAIN AS A COMPONENT OF INFORMATION SECURITY
    Authors: Anton Kulikovskyi
    Number of views: 196
  • 90-103
    RESULTS AND TOOLS FOR EVALUATING THE EFFECTIVENESS OF FOCUSING SYSTEMS TO IMPROVE ACCESSIBILITY IN WIRELESS NETWORKS
    Authors: Volodymyr Astapenya, Volodymyr Sokolov, Mahyar TajDini
    Number of views: 135

Number 3, 2019

  • 6-26
    RESEARCH OF STABILITY IN AD HOC SELF-ORGANIZATED WIRELESS NETWORKS
    Authors: Maksym Vladymyrenko, Volodymyr Sokolov, Volodymyr Astapenya
    Number of views: 137
  • 27-41
    METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTS
    Authors: Mariya Nazarkevych, Yaroslav Voznyi
    Number of views: 221
  • 42-52
    APPLICABLE ASPECTS OF AUTHENTICATION DATA PROTECTION
    Authors: Yurii Borsukovskyi, Victoria Borsukovska
    Number of views: 133
  • 53-62
    COMPLEX METHOD OF AUTOMATIC FONOSEMANTIC ANALYSIS OF TEXT INFORMATION ON THE BASIS OF EVALUATION OF HIGH SEMANTIC UNITS IN THE CONDITIONS OF INFORMATIVE CONTINUATION
    Authors: Volodymyr Barannik, Tatyana Belikova, Maksim Kapko, Irina Gurzhiy
    Number of views: 147
  • 63-87
    A METHOD OF FORMING OF ANTI-VIRUS PROTECTION OF DATA IS WITH THE USE OF SAFE ROUTING OF METADATAS
    Authors: Serhii Smirnov, Liudmyla Polishchuk, Tetiana Smirnova, Oksana Konoplitska-Slobodeniuk, Oleksii Smirnov
    Number of views: 153
  • 88-96
    INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES
    Authors: Zoreslava Brzhevska, Nadiia Dovzhenko, Roman Kyrychok, Galyna Gaidur, Andriy Anosov
    Number of views: 292
  • 97-103
    STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY
    Authors: Yanina Roy, Nataliia Mazur, Olena Riabchun
    Number of views: 118
  • 104-111
    METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES
    Authors: Vladyslav Yaskevych, Oleksandr Klochko
    Number of views: 166
  • 112-121
    ANALYSIS OF THE USE OF THE HIGHLY EFFECTIVE IMPLEMENTATION OF THE SHA-512 HASH FUNCTIONS FOR THE DEVELOPMENT OF SOFTWARE SYSTEMS
    Authors: Mykola Pasyeka, Nadiia Pasieka, Mykhaylo Bestylnyy, Vasyl Sheketa
    Number of views: 148
  • 122-133
    THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRY
    Authors: Volodymyr Pikh, Mykhaylo Bestylnyy, Vasyl Sheketa
    Number of views: 166


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us