, НТУУ «КПИ», Ukraine
-
Ukrainian Information Security Research Journal Vol. 13 No. 1 (50) (2011) - Articles
СЕРВИС НЕОТКАЗУЕМОСТИ В WEB(ПРИЛОЖЕНИЯХ
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 13 No. 2 (51) (2011) - Articles
АУТЕНТИФИКАЦИЯ В WEB-ПРИЛОЖЕНИЯХ
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 13 No. 2 (51) (2011) - Articles
ПРИМЕНЕНИЕ ЭКОНОМИКО-МОТИВАЦИОННЫХ СООТНОШЕНИЙ ДЛЯ ОЦЕНИВАНИЯ ВЕРОЯТНОСТНЫХ ПАРАМЕТРОВ ИНФОРМАЦИОННЫХ РИСКОВ
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 15 No. 4 (2013) - Articles
Information risk: research methods and techniques, models and methods of risk identification
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 3 (2014) - Articles
ADFS authentication services for cloud infrastructure
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 3 (2014) - Articles
Practical aspects of risk management of threat in information system
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 4 (2014) - Articles
On the computational security of randomized stream ciphers proposed by Mihaljević and Imai
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
FAST ALGORITHMS FOR CONSTRUCTING k - DIMENSIONAL APPROXIMATIONS OF BOOLEAN FUNCTIONS
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 1 (2015) - Articles
THE EXTANDING OF ECONOMIC-COST MODEL OF INFORMATION SECURITY RISKS MANAGMENT BY THE USE OF SOCIAL-PSYCHOLOGICAL TYPES OF INTRUDERS
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 17 No. 3 (2015) - Articles
APPLICATION OF ECONOMIC-COST MODEL OF INFORMATION RISKS FOR EVALUATION LIMITЕВ VOLUME OF INVESTMENT IN INFORMATION SECURITY
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 4 (2015) - Articles
Computer viruses simulation using probabilistic cellular automata
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 17 No. 4 (2015) - Articles
Integrity control of masked database foreign key
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 18 No. 2 (2016) - Articles
Access control to table rows using hierarchy of authority
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Information Security Research Journal Vol. 18 No. 3 (2016) - Articles
Prefix cyber-: all is obvious?
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Database tables masking using the SQL CLR technology
Abstract PDF PDF (Українська) PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
MS SQL SERVER security settings audit
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 1 (2017) - Articles
Quantum one-way accumulator
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 19 No. 3 (2017) - Articles
Application of reflexive risk models for protection of information in the cyberspace
Abstract PDF PDF (Українська) PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 1 (2018) - Articles
Models of multilevel databases security
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 4 (2019) - Articles
Comparative analysis ofmaturity models to evaluate information security
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 1 (2020) - Articles
Comparison of information security architectures
Abstract PDF (Українська) PDF PDF (Русский)