Skip to main content Skip to main navigation menu Skip to site footer
  • Current
  • Archives
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
Search
  • Login
  1. Home /
  2. Archives /
  3. Vol. 2 No. 82 (2025)

Vol. 2 No. 82 (2025)

Published: 2025-08-23
  • Analysis of modern approaches to cybersecurity requirements management during soft-ware implementation

    S.O. Gnatyuk, V.M. Sydorenko, A.A. Skurativskyi
    5-18
    • PDF (Українська)
  • Analytical review of methods and technologies for real-time big data processing in IoT infrastructures

    M.O. Kalashnyk
    19-25
    • PDF (Українська)
  • Analysis of traffic classification methods in software-defined networks

    O.Y. Kulakov, V.Y. Cherednyk
    26-32
    • PDF (Українська)
  • N-phoneme model of speech signal recognition based on hidden Markov processes

    O.Yu. Lavrynenko
    33-41
    • PDF
  • Weighted checksum based method for fast burst error correction in wireless channels

    O.P. Markovskyi, Y.V. Grygorash
    42-54
    • PDF (Українська)
  • Development of a model for forecasting web application vulnerabilities using machine learning methods

    P.I. Melnychenko
    55-62
    • PDF (Українська)
  • A method for expanding the reference model of open systems interaction

    M.K. Pechurin, L.P. Kondratova, S.M. Pechurin
    63-67
    • PDF
  • Technology of quality assessment of critical software systems based on ontological modeling

    I.E. Raichev
    68-91
    • PDF (Українська)
  • Alternative approaches for smart contract upgradeability

    R.O. Serebriakov, I.A. Klymenko
    92-101
    • PDF
  • Analysis of load balancing algorithms in cloud computing

    O.I. Shklyar
    102-107
    • PDF (Українська)

Developed By

Open Journal Systems

Language

  • English
  • Українська

Information

  • For Readers
  • For Authors
  • For Librarians
More information about the publishing system, Platform and Workflow by OJS/PKP.