Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Problems of Informatization and Management
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 2 No. 82 (2025)
Vol. 2 No. 82 (2025)
Published:
2025-08-23
Analysis of modern approaches to cybersecurity requirements management during soft-ware implementation
S.O. Gnatyuk, V.M. Sydorenko, A.A. Skurativskyi
5-18
PDF (Українська)
Analytical review of methods and technologies for real-time big data processing in IoT infrastructures
M.O. Kalashnyk
19-25
PDF (Українська)
Analysis of traffic classification methods in software-defined networks
O.Y. Kulakov, V.Y. Cherednyk
26-32
PDF (Українська)
N-phoneme model of speech signal recognition based on hidden Markov processes
O.Yu. Lavrynenko
33-41
PDF
Weighted checksum based method for fast burst error correction in wireless channels
O.P. Markovskyi, Y.V. Grygorash
42-54
PDF (Українська)
Development of a model for forecasting web application vulnerabilities using machine learning methods
P.I. Melnychenko
55-62
PDF (Українська)
A method for expanding the reference model of open systems interaction
M.K. Pechurin, L.P. Kondratova, S.M. Pechurin
63-67
PDF
Technology of quality assessment of critical software systems based on ontological modeling
I.E. Raichev
68-91
PDF (Українська)
Alternative approaches for smart contract upgradeability
R.O. Serebriakov, I.A. Klymenko
92-101
PDF
Analysis of load balancing algorithms in cloud computing
O.I. Shklyar
102-107
PDF (Українська)
Developed By
Open Journal Systems
Language
English
Українська
Information
For Readers
For Authors
For Librarians
Make a Submission
Make a Submission
Keywords