Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 2 No. 82 (2025)
Vol. 2 No. 82 (2025)
Published:
2025-08-23
Analysis of modern approaches to cybersecurity requirements management during soft-ware implementation
S.O. Gnatyuk, V.M. Sydorenko, A.A. Skurativskyi
5-18
PDF (Українська)
Analytical review of methods and technologies for real-time big data processing in IoT infrastructures
M.O. Kalashnyk
19-25
PDF (Українська)
Analysis of traffic classification methods in software-defined networks
O.Y. Kulakov, V.Y. Cherednyk
26-32
PDF (Українська)
N-phoneme model of speech signal recognition based on hidden Markov processes
O.Yu. Lavrynenko
33-41
PDF
Weighted checksum based method for fast burst error correction in wireless channels
O.P. Markovskyi, Y.V. Grygorash
42-54
PDF (Українська)
Development of a model for forecasting web application vulnerabilities using machine learning methods
P.I. Melnychenko
55-62
PDF (Українська)
A method for expanding the reference model of open systems interaction
M.K. Pechurin, L.P. Kondratova, S.M. Pechurin
63-67
PDF
Technology of quality assessment of critical software systems based on ontological modeling
I.E. Raichev
68-91
PDF (Українська)
Alternative approaches for smart contract upgradeability
R.O. Serebriakov, I.A. Klymenko
92-101
PDF
Analysis of load balancing algorithms in cloud computing
O.I. Shklyar
102-107
PDF (Українська)
Developed By
Open Journal Systems
Language
English
Українська
Information
For Readers
For Authors
For Librarians