Publication schedule
-
№4 December 2025
-
№1 March 2026Submission deadline: 27 February 2026
-
№2 June 2026Submission deadline: 29 May 2026
-
№3 September 2026Submission deadline: 31 August 2026
Articles by keywords "information security"
Concept of ensuring the resilience of operation of national digital platforms and blockchain ecosystems under the new quantum threat to security
- Year: 2025
- Volume: 18
- Issue: 2
- 21
- 2381
- Pages: 56-73
New types of threats and assessment of quantum stability of information systems in the field of foreign trade activity
- Year: 2024
- Volume: 17
- Issue: 4
- 30
- 3068
- Pages: 16-34
Ensuring confidence in control systems of technological equipment
- Year: 2021
- Volume: 14
- Issue: 4
- 24
- 5296
- Pages: 71-83
Information security objects modelling for risk assessment
- Year: 2009
- Issue: 5
- 0
- 7691
- Pages: 151-155
Security facilities construction and optimization based on risk analysis
- Year: 2011
- Issue: 6
- 1
- 7839
- Pages: 207-211
Technology Information Security of Large Museum and Exhibition Complexes
- Year: 2015
- Issue: 6
- 180
- 8156
- Pages: 14-24
Digital watermarks system for audio signals based on the reverberation effect
- Year: 2012
- Issue: 6
- 0
- 7343
- Pages: 43-49
Software-based complex for information security risk assessment based on frame-production knowledge representation
- Year: 2010
- Issue: 5
- 0
- 7679
- Pages: 98-102
Securing confidentiality of transmitted information at the network layer
- Year: 2009
- Issue: 4
- 0
- 7685
- Pages: 60-65
Technology for protection of personal data using ORACLE DBMS
- Year: 2012
- Issue: 4
- 0
- 7285
- Pages: 36-40
Scientific-educational cluster as a modern form of professional education
- Year: 2012
- Issue: 2
- 0
- 7230
- Pages: 161-168
Access control with the help of Gödel’s encoding of virtual connections content
- Year: 2012
- Issue: 2
- 0
- 7991
- Pages: 104-109
Network centric access control model and methods in cloud computing systems
- Year: 2012
- Issue: 2
- 0
- 7872
- Pages: 91-95
Protection of information resources branch monitoring system and fishery database cryptographic technique
- Year: 2012
- Issue: 2
- 0
- 7374
- Pages: 7-13
Data mining in a database of the antivirus protection management server
- Year: 2013
- Issue: 1
- 849
- 9113
- Pages: 44-49