, Черкаський державний технологічний університет, Ukraine
-
Ukrainian Information Security Research Journal Vol. 14 No. 3 (56) (2012) - Articles
The cryptographic data transcoding operations matrix models synthesis method
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 15 No. 2 (2013) - Articles
Steganalysis algorithm for images that have been lossy compressed
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 16 No. 4 (2014) - Articles
Method of message authentication code formation based on permutations
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 19 No. 4 (2017) - Articles
Steganographic method for protection the objects of intellectual properties and intellectual rights
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 20 No. 2 (2018) - Articles
Experimental research of the software complex to attack the linguistic stegosystem
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 3 (2019) - Articles
Determining the coordinates of semantic particle in english text with a known psycholinguist portrait of propagandist
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 21 No. 4 (2019) - Articles
Determining the coordinates of semantic particle in analysing the english texts of group propaganda
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 22 No. 2 (2020) - Articles
The method of english text's computerized formation in accordance with the propagandist's psycholinguistic portrait
Abstract PDF (Українська) PDF PDF (Русский) -
Ukrainian Information Security Research Journal Vol. 14 No. 3 (56) (2012) - Articles
Methodology for the synthesis of systems security level evaluation of public information resources from social engineering attacks
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 15 No. 1 (2013) - Articles
Synthesis methodology and software implementation system evaluation harm to national security in protection of state secrets
Abstract PDF (Українська) -
Ukrainian Information Security Research Journal Vol. 19 No. 4 (2017) - Articles
Method of significant structural characteristics of transformant coding for increase in integrity of aerial photographs in system of air reconnaissance
Abstract PDF (Українська) PDF PDF (Русский)