Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Animal Research International
Perspectiva Teológica
Revista dos Estudantes de Direito da UnB
Journal of Entrepreneurship, Business and Economics



Register Journal



Visitors Counter

TodayToday
504
YesterdayYesterday
2118
This weekThis week
10030
Last WeekLast week
13850
This monthThis month
6525
Last monthLast month
50787
All daysAll days
5833598

Cybersecurity: Education, Science, Technique

Number 8, 2020

  • 6-21
    3- AND 5-ISOGENIES OF SUPERSINGULAR EDWARDS CURVES
    Authors: Anatoly Bessalov, Evgeniy Grubiyan, Volodymyr Sokolov, Pavlo Skladannyi
    Number of views: 255
  • 22-33
    METHODS AND MODELS OF CONSTRUCTION OF INFORMATION TECHNOLOGIES OF REMOTE MEASUREMENT OF NANOBRATION
    Authors: Hennadii Hulak, George Otto
    Number of views: 252
  • 34-48
    DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3
    Authors: Yurii Borsukovskyi
    Number of views: 399
  • 49-60
    ARCHITECTURE SECURITY PRINCIPLES OF THE ANDROID APPLICATIONS-BASED INFORMATION SYSTEM
    Authors: Roman Drahuntsov, Dmytro Rabchun, Zoreslava Brzhevska
    Number of views: 313
  • 61-72
    TELEGRAM OPEN NETWORK. COMPLEX ANALYSIS OF THE INNOVATIVE PROJECT AND ITS COMPONENTS
    Authors: Yulia Tkach, Arthur Bryhynets
    Number of views: 225
  • 73-84
    MATHEMATICAL MODEL FOR TRANSITIONAL PROCESSES IN JOSEPHSON MEMORY ELEMENTS
    Authors: Mykhailo Tyhanskyi, Andrii Partyka
    Number of views: 255
  • 85-96
    APPLIED AND METHODICAL ASPECTS OF USING HASH FUNCTIONS FOR INFORMATION SECURITY
    Authors: Yuliia Zhdanovа, Svitlana Spasiteleva , Svitlana Shevchenko, Kateryna Kravchuk
    Number of views: 300
  • 97-112
    APPLICATION OF THE CONVOLUTIONAL NEURAL NETWORKS FOR THE SECURITY OF THE OBJECT RECOGNITION IN A VIDEO STREAM
    Authors: Danylo Svatiuk, Oksana Svatiuk , Oleksandr Belei
    Number of views: 333
  • 113-123
    GENERAL DIFFERENTIAL-GAME MODEL OF POTENTIALLY DANGEROUS PATTERN OF CYBER-ATTACK
    Authors: Volodymyr Okhrimchuk
    Number of views: 272
  • 124-134
    PROSPECTIVE PROTECTION METHODS OF WINDOWS OPERATION SYSTEM
    Authors: Anna Ilyenko , Sergii Ilyenko , Tatiana Kulish
    Number of views: 280
  • 135-148
    DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD
    Authors: Valerii Lakhno, Dmytro Kasatkin, Andii Blozva, Maksym Misiura, Borys Husiev
    Number of views: 232
  • 149-164
    COMPARATIVE ANALYSIS OF IMAGE RECOGNITION METHODS OBTAINED FROM SENSORS OF THE VISIBLE SPECTRUM
    Authors: Volodymyr Hrytsyk , Mariya Nazarkevych , Andrij Dyshko
    Number of views: 252
  • 165-173
    MODEL OF VULNERABILITIES ANALYSIS OF SOCIO-TECHNICAL SYSTEMS TO THE SOCIAL ENGINEERING INFLUENCES
    Authors: Volodymyr Mokhor, Oksana Tsurkan, Rostyslav Herasymov, Olha Kruk, Valeriia Pokrovska
    Number of views: 236
  • 174-191
    METHODOLOGICAL ASPECTS OF DIGITAL TRANSFORMATION APPLIED TO PUBLIC SERVICES
    Authors: Oleg Burba, Yuriy Kopytin, Olga Pasichnyk, Andriy Piskun
    Number of views: 299
  • 192-201
    METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS FUNCTIONAL ANALYSIS
    Authors: Vasyl Tsurkan
    Number of views: 270


1
© 2013-2024, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us