, Национальный авиационный университет, Ukraine
-
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Network & Internet Security
Mathematical model of reliable reliability for complex of technical information security
Abstract PDF (Українська) PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 18 No. 2 (2012) - Network & Internet Security
Anomaly-based detection system in computer networks
Abstract PDF (Русский) PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Network & Internet Security
Method of parameter fuzzification based on linguistic standards for cyber attacks detection
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Software & Hardware Architecture Security
Method of single technical information security system designing with probable reliability and given parameters of breaking
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Cryptology
Performance increasing methods for binary field inversion
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 1 (2014) - Organizational & Law Information Security
Problems review of information security of the international payment systems
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 20 No. 2 (2014) - Organizational & Law Information Security
The necessity of global navigation satellite systems GPS, GLONASS, GALILEO information security
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Software & Hardware Architecture Security
Localization of control points on the characteristic fragments of human face image
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 1 (2015) - Cryptology
Approaches to performance increasing of extended Euclidean algorithm for double precision division on single precision large integers
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 2 (2015) - Organizational & Law Information Security
Information-psychological security of society as a way of preserving nation
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 2 (2015) - Information Security Management
Method of n-fold incrementation the number of terms the linguistic variables in the tasks of analysis and risk assessment
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 21 No. 3 (2015) - Software & Hardware Architecture Security
Efficiency coefficient calculation for technical information security based on its parameters
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 1 (2016) - Software & Hardware Architecture Security
Simulation of hacking and operation condition analysis for technical information security
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 2 (2016) - Cryptology
Systems synthesis of discrete Walsh-similarly sequention functions of eighth degree
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 2 (2016) - Information Security Management
The risk assessment method of information security based on open databases vulnerabilities
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Information Security Management
Integrated adaptive system of security risk assessment for information systems resources
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Software & Hardware Architecture Security
Forming and generation of acoustic impulse for the method of acoustic location
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 23 No. 3 (2017) - Software & Hardware Architecture Security
Comparative analysis of binarization methods for images of eye iris
Abstract PDF (Українська) -
Ukrainian Scientific Journal of Information Security Vol. 26 No. 1 (2020) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Structural model of the DSS for the State Examination of the IISS
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 26 No. 1 (2020) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Angstromtechnology of aviation cybersecurity
Abstract PDF (Українська) PDF (Русский) PDF -
Ukrainian Scientific Journal of Information Security Vol. 26 No. 1 (2020) - Network & Internet Security
Social network communities’ search model
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Scientific Journal of Information Security Vol. 22 No. 3 (2016) - Cybersecurity & Critical Information Infrastructure Protection (CIIP)
Design of a model for intellectual detection of cyber-attacks, based on the logical procedures and the coverage matrices of features
Abstract PDF (Українська) PDF (Русский) PDF