Archived Papers for Journal
Cybersecurity: Education, Science, Technique >>
Vol.3, No.3
Publisher: Borys Grinchenko Kyiv University
Publishing Date: 2019-03-28
- RESEARCH OF STABILITY IN AD HOC SELF-ORGANIZATED WIRELESS NETWORKSAuthors: Maksym Vladymyrenko. Volodymyr Sokolov. Volodymyr Astapenya.
- METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTSAuthors: Nazarkevych Mariya. Voznyi Yaroslav.
- APPLICABLE ASPECTS OF AUTHENTICATION DATA PROTECTIONAuthors: Yurii Borsukovskyi. Victoria Borsukovska.
- COMPLEX METHOD OF AUTOMATIC FONOSEMANTIC ANALYSIS OF TEXT INFORMATION ON THE BASIS OF EVALUATION OF HIGH SEMANTIC UNITS IN THE CONDITIONS OF INFORMATIVE CONTINUATIONAuthors: Volodymyr Barannik. Tatyana Belikova. Maksim Kapko. Irina Gurzhiy.
- A METHOD OF FORMING OF ANTI-VIRUS PROTECTION OF DATA IS WITH THE USE OF SAFE ROUTING OF METADATASAuthors: Serhii Smirnov. Liudmyla Polishchuk. Tetiana Smirnova. Oksana Konoplitska-Slobodeniuk. Oleksii Smirnov.
- INFORMATION WAR: PROBLEMS, THREATS AND ANTIDESAuthors: Zoreslava Brzhevska. Nadiia Dovzhenko. Roman Kyrychok. Galyna Gaidur. Andriy Anosov.
- STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETYAuthors: Yanina Roy. Nataliia Mazur. Olena Riabchun.
- METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICESAuthors: Vladyslav Yaskevych. Oleksandr Klochko.
- ANALYSIS OF THE USE OF THE HIGHLY EFFECTIVE IMPLEMENTATION OF THE SHA-512 HASH FUNCTIONS FOR THE DEVELOPMENT OF SOFTWARE SYSTEMSAuthors: Mykola Pasyeka. Nadiia Pasieka. Mykhaylo Bestylnyy. Vasyl Sheketa.
- THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRYAuthors: Volodymyr Pikh. Mykhaylo Bestylnyy. Vasyl Sheketa.