, Національний авіаційний університет, Ukraine
-
Ukrainian Scientific Journal of Information Security Vol. 17 No. 1 (2012) - Information Security Management
The system selection of the analysis methods and risk assessment
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 17 No. 1 (2012) - Information Security Management
Multi-criteria optimization problems in information security: clear and fuzzy approaches
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 17 No. 1 (2012) - Information Security Management
Optimization of information security resource allocation in dynamic mode
Abstract PDF (Українська) PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 17 No. 1 (2012) - Network & Internet Security
Technology of aerial photographs processing for the construction of digital maps and map data protecting
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Information Security Management
Indicators of costs productivity of information security
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Information Security Management
Markov chain in determination of information security level
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - History of information security
Ensure secrecy during the mobilization in Russia in 1914
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Documentation, Archives & Information Activity
Harmonization of Ukrainian national standards series "Information and Documentation" with international and European
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Documentation, Archives & Information Activity
Perspective directions for implementation of Ukraine’s state information policy in the sphere of Euro-integration
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Network & Internet Security
Development theoretical methods of protection premises, depending on the parameters of the useful signals, the noisy signals and readability of the speech.
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Network & Internet Security
Analysis of existing authentication systems of information and communication systems and networks
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Network & Internet Security
System analysis and evaluation of the level of protection of state information resources from social engineering attacks
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 1 (2013) - Software & Hardware Architecture Security
Definition of reliable reliability of single technical information security from the real attack attempts
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 1 (2013) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Cybernetic security of the state: characteristic features & problem aspects
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 1 (2013) - Information Security Management
Method of information security management in banking institutions using ISMS "Matrix"
Abstract -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 1 (2013) - Information Security Management
Conditions of saddle point existence in multilevel information security systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 2 (2013) - Network & Internet Security
Implementation of audit & monitoring environment of modern information and communication systems and networks
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 2 (2013) - Software & Hardware Architecture Security
Basic biometric characteristics, modern systems & technologies of biometric authentication
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 2 (2013) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Cyberterrorism: development history, current trends & countermeasures
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Network & Internet Security
Preventions of information leaking in the wireless networks
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Steganography & Steganalysis
Experimental research of bitwise method for information hiding in vector images
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Organizational & Law Information Security
Legal aspects of the state information resources system formation
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 2 (2014) - Information Security Management
Basic performance parameters for cyberincidents response teams
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 2 (2014) - Information Security Management
Extended classification of methods of social engineering
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Network & Internet Security
The detection method of identification terms for intrusion detection system
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Network & Internet Security
The concept of secure radiotelephone equipment building for aeronautical applications
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Software & Hardware Architecture Security
Fuzzy neural production network model for information security systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Cryptology
Cryptographic system of protection UAVs communication channels against illegal intrusion
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Privacy & Protection from Identity Theft
Personal data leakage prevention system for network channels
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Information Security Management
The n-fold decrease method of linguistics variables, based on the private database extension
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Network & Internet Security
Modem as a part of secured radiotelephone equipment for aviation
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Business Intelligence & Knowledge Management
Integrated approach to enterprise content management
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Information Security Management
Training quality assessment of information security specialists
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Information Security Management
Analysis of modern crisis management systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Information Security Management
Method of function realization for transformation etalons in risk analysis and assessment
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 2 (2015) - Cryptology
Method of trit pseudorandom sequences generating for quantum cryptography systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 3 (2015) - Network & Internet Security
Substantiation of the basic requirements for 5th generation cellular networks security systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 3 (2015) - Software & Hardware Architecture Security
Bugs detection using acoustic location
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 3 (2015) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Modern approaches to critical infrastructure objects detection and identification
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 3 (2015) - Cryptology
Generalized classification of modern quantum cryptography and communication methods
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 3 (2015) - Organizational & Law Information Security
Мас-медіа як канал маніпулятивного впливу на суспільство
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 1 (2016) - Software & Hardware Architecture Security
Modern obfuscation methods for secure coding
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 1 (2016) - Software & Hardware Architecture Security
Structure analysis of secured applications programming language for programmable logic controllers
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 1 (2016) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Modern critical aviation information systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 1 (2016) - Information Security Management
Analysis of «crisis» definition and basic aspects of business continuing planning concept
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 2 (2016) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Conceptual framework of modern cellular network cybersecurity rising
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 2 (2016) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Basic model for cybersecurity requirements definition in civil aviation
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 2 (2016) - Business Intelligence & Knowledge Management
Modern information-analytical systems for data processing and prediction
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Organizational & Law Information Security
Secrets protection and counteracting espionage in the United States between beginning of the war for independence and the end of WW I (1774-1918)
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Organizational & Law Information Security
The system of terms and determinations in security methodology of state information resources
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Organizational & Law Information Security
Analysis of modern information-psychological influence theories in aspect of information confrontation
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Organizational & Law Information Security
Information war. Mass media as an instrument of information influence on society. Part 1
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 23 No. 3 (2017) - Information Security Management
Appliance of incident / potential crisis situations correlation mechanism for assessment of current situation criticality level in information sphere
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 24 No. 3 (2018) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Model of data for improving cybersecurity IP-PBX
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 24 No. 3 (2018) - Information Security Management
Open intrusion detection systems analysis
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 25 No. 1 (2019) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Stationary systems of cyberattacks detection and prevention for cyberprotection and cybercounterintelli-gence (by example USA)
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 25 No. 1 (2019) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Information war protection from destructive informational and psychological influences. Part 2
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 25 No. 2 (2019) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Model of parameters for identification of functional security profile in computer systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 26 No. 1 (2020) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Structural model of the DSS for the State Examination of the IISS
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 26 No. 1 (2020) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Angstromtechnology of aviation cybersecurity
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 17 No. 1 (2012) - Organizational & Law Information Security
The basic provisions of information classification order in the USA
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Network & Internet Security
Review of intrusion detection systems based on honeypot technology
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 1 (2013) - Network & Internet Security
Etalon models of linguistic variables for information security intruders’ detection and identification
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 19 No. 3 (2013) - Information Security Management
Influence of confrontation form on optimization of information security resource allocation process
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Network & Internet Security
Method and model of intellectual threats detection for information and communication transport environment
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Information Security Management
Typical «effect-costs» dependence function for information security
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 1 (2016) - Network & Internet Security
Vulnerability investigation for Internet of things sensor subnetworks architecture for different types of attacks
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 25 No. 3 (2019) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Information and psychological confrontation in Ukraine
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 26 No. 1 (2020) - Network & Internet Security
Social network communities’ search model
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 3 (2014) - Cryptology
Synthesis of elementary transposition functions controlled by information
Abstract PDF (Українська)