, Национальный авиационный университет, Ukraine
-
Ukrainian Information Security Research Journal Vol. 14 No. 3 (56) (2012) - Articles
Сriterion of periodicity of checking uptime of telecommunications systems
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 14 No. 3 (56) (2012) - Articles
Model of the control of mobile sources of thermal influences on objects of security
Abstract PDF (Русский) PDF (Українська) PDF -
Ukrainian Information Security Research Journal Vol. 14 No. 4 (57) (2012) - Articles
Analysis and evaluation of efficiency indicators of operation of communication systems station equipment
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 14 No. 4 (57) (2012) - Articles
The model of heuristic rules on the set of logical-linguistic tangles for abnormality detection in computer systems
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 2 (2014) - Articles
Software-modeling complex SCSPS stream encryption algorithm
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 2 (2014) - Articles
Government information resources threat: terms and determinations
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 2 (2014) - Articles
Integer arithmetic with delayaed carry
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 2 (2014) - Articles
Method of template hiding data in vector images
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 2 (2014) - Articles
Solution to the inverse problem of information security economic management
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 3 (2014) - Articles
Program-modeling complex BPC algorithm stream encryption and noiseless coding video signals UAV
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 3 (2014) - Articles
Modern neural network method evaluation model security settings resources information systems
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
FEATURES OF THE IRIS IMAGE PRE-PROCESSING ALGORITHM
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
NEW PRINCIPLES OF CONSTRUCTION CRYPTOGRAPHIC PRIMITIVES OF NONLINEAR SUBSTITUTIONS
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
SYSTEM ANALYSIS OF MULTICRITERION OPTIMIZATION PROBLEM FOR INFORMATION SYSTEM PROTECTION (HACKING)
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
METHOD OF CRITICALITY LEVEL ASSESSMENT FOR CRISIS MANAGEMENT SYSTEMS
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 2 (2015) - Articles
METHOD OF INCREMENT ORDER OF LINGUISTIC VARIABLES FOR RISK ANALYSIS AND ASSESSMENT SYSTEMS
Abstract PDF (Русский) PDF (Українська) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 2 (2015) - Articles
CLASSIFICATION OF THREATS TO STATE INFORMATIVE RESOURCES OF NORMATIVELY-LEGAL ASPIRATION. METHODOLOGY OF CONSTRUCTION OF CLASSIFIER
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
ENCAPSULATING SECRET ENCRYPTION KEY SUBSCRIBERS OPEN COMMUNICATION CHANNELS BASED ON GENERALIZED GALOIS MATRIX
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
CONSTRUCTION AND ANALYSIS METHODOLOGY OF COMPLEX TECHNICAL INFORMATION SECURITY WITH PROBABILISTIC RELIABILITY AND COUNTING OF TEMPORAL BREAKING ATTEMPTS
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
METHODOLOGY OF DEFENCE OF STATE INFORMATIVE RESOURCES. COMPARATIVE ANALYSIS OF BASIC TERMS AND DETERMINATIONS
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
n-FOLD INCREMENTATION OF LINGUISTIC VARIABLES ORDER METHOD, BASED ON PARTICULAR BASE EXPANSION
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
ARCHITECTURE OF MODERN SECURED INFORMATION & COMMUNICATION AIRPORT NETWORK
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
THE PROTECTION OF AVIATION BOARD NETWORKS FROM ATTACKS BY CONFLICT THEORY METHODS WITH HONEY POTS
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 4 (2015) - Articles
Extension of the field, generates a primitive space matrix Galois
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 4 (2015) - Articles
The control safety of airborne local network in the information and calculating system of air cluster
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
A cryptographic use indicator matrices systems Walsh functions
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
Computer design of nanocircuits for cryptographic engineering
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
A methodology for building cyberattack-generated anomaly detection systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
Model and method of assessment risks protection of personal data during their processing at the automated system
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
Research and classification of information security mechanisms in sensor networks
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
Recommendations for cybersecurity strategy of Ukraine development
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 1 (2016) - Articles
Computer complex for detection and evaluation of crisis situations in information sphere
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 2 (2016) - Articles
Technology of construction and defence of the ukrainian segment of the identifiers’ tree of state informative resources on the basis of risk management
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 2 (2016) - Articles
For byte-oriented stream cipher on based with a uniform density the nonlinear substitutions algorithm
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 2 (2016) - Articles
Analysis of modern means of creating a device vibration impact on critical infrastructure information system
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 2 (2016) - Articles
Secured data center model based on cloud computing technology
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 2 (2016) - Articles
The qualitative and quantitative method of information security risk assessment
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 18 No. 3 (2016) - Articles
Research of information security database vulnerabilities
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 3 (2016) - Articles
Experimental research of efficiency increasing method for qutrits quantum cryptography protocols
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 3 (2016) - Articles
Method for cyberincidents network-centric monitoring in modern information & communication systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 4 (2016) - Articles
Method of generation of casual numbers on the basis of the use of apparatus of the computer plugged in the Internet
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 4 (2016) - Articles
Iris in images preparation identificaton
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 4 (2016) - Articles
Synthesis of symmetrical functions of golden ratio
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 4 (2016) - Articles
Bistable and integrated based tuple model of risk characteristics
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
The information content of the Fourier coefficients in the authentication by the iris of the eye
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Comparative analysis of the efficiency of algorithms fast Fourier transform in the basis systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Research based on tools investigation of security risk assessment according to the information systems resources
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Protect the operating environment internet voting systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Multilevel data model for requirements providing identification accordingly to regulatory support for civil aviation cybersecurity
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
Efficiency of quite proof cryptosystems with megascopic distance of unicity
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
The tuples formation method for analytic-synthetic tuple model of information security
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
Experimental study of method of determination the level of critical information infrastructure importance in the civil aviation
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 3 (2017) - Articles
The methodology for the synthesis of adaptive risk assessment systems of security information system resources
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 3 (2017) - Articles
Analysis of basic terminology and negative consequences from cyber attaks on information-telecommunication systems of objects state’s critical infrastructure
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 3 (2017) - Articles
The etalons models of linguistic variables for sniffing attacks detection
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 3 (2017) - Articles
Cryptographic method of defence of critical aviation informative systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 4 (2017) - Articles
Ukrainian critical information infrastructure: terms, sectors and consequences
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 1 (2018) - Articles
The model of objects classifier of critical information infrastructure of the state
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 1 (2018) - Articles
Systematic byte-oriented codes
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 2 (2018) - Articles
Optimal Wales and suspense-based bases disurity transformation of Fourier
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 3 (2018) - Articles
The software for the formation of parameters etalons for cyber-attacks detection systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 3 (2018) - Articles
Coding and decoding of systematic Reed-Solomon codes by method, which alternative of algorithm of Peterson-Gorenstein-Zirler
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 3 (2018) - Articles
Probability reliability of technical protection of information depending on background
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 3 (2018) - Articles
Method of counteraction of attackes of mediator in transparent system the internet voting
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 4 (2018) - Articles
Analysis of confidentiality of information transfer in DSSS systems in conditions of limited systems of used signal constructions
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 4 (2018) - Articles
Scaling and enhancing data protection for web application data in accordance with PCI DSS, HIPAA/HITECH, FEDRAMP standards
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 4 (2018) - Articles
Estimation of financial costs for building of information protection system
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 4 (2018) - Articles
Analysis of intrusion detection systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 1 (2019) - Articles
Method of partition of load between servers of system the internet voting
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 1 (2019) - Articles
Authentication method of information systems user by their handwriting with multi-stage correction of primary data
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 2 (2019) - Articles
Method of structuring code constructions based on the Gaussian mixture model and separation of its components
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 2 (2019) - Articles
Decomposition model of representation of semantic constants and variables for implementation of examinations in the TPI sphere
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 2 (2019) - Articles
Technique for automated target object search in video stream from UAV in post-processing mode
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 3 (2019) - Articles
Design method and evaluation of the working single technical protection information on the selected direction of hacking
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 4 (2019) - Articles
Method of identification the functional security profile
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 1 (2020) - Articles
Sequential two-level information protection with probability reliability
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 2 (2020) - Articles
Algorithm for the synthesis of irreducible polynomials of linear complexity
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 2 (2020) - Articles
Mathematical description of angstromtechnologies for artificial intelligence usage in aviation cybersecurity
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 2 (2020) - Articles
A multiple-theoretical GDPR model of parameters for personal data
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 14 No. 4 (57) (2012) - Articles
The method of abnormality detection caused by cyber attacks in computer networks
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
THE SELECTION OF CHARACTERISTIC FRAGMENTS IN THE IMAGE OF A HUMAN FACE
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 4 (2014) - Articles
Model of a conflict situation in information security management
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 2 (2015) - Articles
METHOD FOR INCIDENT/POTENTIAL CRISES DETECTION
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 4 (2015) - Articles
The method of development of basic detection rules for intrusion detection systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Experimental research of trit pseudorandom sequence generating method for cryptographic applications
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
Application of the expert assessment method to assessment information risks higher educational institution
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 19 No. 2 (2017) - Articles
The use of passive optical devices for the protection of information in fiber-optic communication lines and networks
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 1 (2018) - Articles
The method of transforming intervals into triangular fuzzy numbers for systems for assessing information security risks
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 3 (2018) - Articles
Methods for developing a deep neural network architecture designed to recognize computer viruses
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 14 No. 4 (57) (2012) - Articles
Modern problems of creation of complex information and control real time systems
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 19 No. 4 (2017) - Articles
The problem of pattern recognition dimensionality in biometric authentication systems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 2 (2019) - Articles
Methodology of processing multi-digit numbers in asymmetric cryptosystems
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 3 (2019) - Articles
Multi-agent technology of searching for digital radio-accelerated devices based on clustering by a bee colony method
Abstract PDF (Українська) PDF PDF (Русский)