ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

Cybersecurity: Education, Science, Technique >>

Vol.3, No.3

Publisher: Borys Grinchenko Kyiv University

Publishing Date: 2019-03-28

  1. RESEARCH OF STABILITY IN AD HOC SELF-ORGANIZATED WIRELESS NETWORKS

    Authors: Maksym Vladymyrenko. Volodymyr Sokolov. Volodymyr Astapenya.

  2. METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTS

    Authors: Nazarkevych Mariya. Voznyi Yaroslav.

  3. APPLICABLE ASPECTS OF AUTHENTICATION DATA PROTECTION

    Authors: Yurii Borsukovskyi. Victoria Borsukovska.

  4. COMPLEX METHOD OF AUTOMATIC FONOSEMANTIC ANALYSIS OF TEXT INFORMATION ON THE BASIS OF EVALUATION OF HIGH SEMANTIC UNITS IN THE CONDITIONS OF INFORMATIVE CONTINUATION

    Authors: Volodymyr Barannik. Tatyana Belikova. Maksim Kapko. Irina Gurzhiy.

  5. A METHOD OF FORMING OF ANTI-VIRUS PROTECTION OF DATA IS WITH THE USE OF SAFE ROUTING OF METADATAS

    Authors: Serhii Smirnov. Liudmyla Polishchuk. Tetiana Smirnova. Oksana Konoplitska-Slobodeniuk. Oleksii Smirnov.

  6. INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES

    Authors: Zoreslava Brzhevska. Nadiia Dovzhenko. Roman Kyrychok. Galyna Gaidur. Andriy Anosov.

  7. STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY

    Authors: Yanina Roy. Nataliia Mazur. Olena Riabchun.

  8. METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES

    Authors: Vladyslav Yaskevych. Oleksandr Klochko.

  9. ANALYSIS OF THE USE OF THE HIGHLY EFFECTIVE IMPLEMENTATION OF THE SHA-512 HASH FUNCTIONS FOR THE DEVELOPMENT OF SOFTWARE SYSTEMS

    Authors: Mykola Pasyeka. Nadiia Pasieka. Mykhaylo Bestylnyy. Vasyl Sheketa.

  10. THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRY

    Authors: Volodymyr Pikh. Mykhaylo Bestylnyy. Vasyl Sheketa.