Publication schedule
  • №3 September 2025
  • №4 December 2025

Articles by keywords "information security"

Concept of ensuring the resilience of operation of national digital platforms and blockchain ecosystems under the new quantum threat to security

Intelligent Systems and Technologies, Artificial Intelligence
  • Year: 2025
  • Volume: 18
  • Issue: 2
  • 12
  • 172
  • Pages: 56-73

New types of threats and assessment of quantum stability of information systems in the field of foreign trade activity

Information Technologies
  • Year: 2024
  • Volume: 17
  • Issue: 4
  • 28
  • 993
  • Pages: 16-34

Ensuring confidence in control systems of technological equipment

Intelligent Systems and Technologies, Artificial Intelligence
  • Year: 2021
  • Volume: 14
  • Issue: 4
  • 24
  • 4554
  • Pages: 71-83

Information security objects modelling for risk assessment

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2009
  • Issue: 5
  • 0
  • 6774
  • Pages: 151-155

Security facilities construction and optimization based on risk analysis

System Analysis and Control
  • Year: 2011
  • Issue: 6
  • 1
  • 6919
  • Pages: 207-211

Technology Information Security of Large Museum and Exhibition Complexes

Circuits and Systems for Receiving, Transmitting and Signal Processing
  • Year: 2015
  • Issue: 6
  • 180
  • 7447
  • Pages: 14-24

Digital watermarks system for audio signals based on the reverberation effect

Information and Signal Processing
  • Year: 2012
  • Issue: 6
  • 0
  • 6638
  • Pages: 43-49

Software-based complex for information security risk assessment based on frame-production knowledge representation

Computer Systems and Software
  • Year: 2010
  • Issue: 5
  • 0
  • 6880
  • Pages: 98-102

Securing confidentiality of transmitted information at the network layer

Information and Signal Processing
  • Year: 2009
  • Issue: 4
  • 0
  • 6899
  • Pages: 60-65

Technology for protection of personal data using ORACLE DBMS

Information and Signal Processing
  • Year: 2012
  • Issue: 4
  • 0
  • 6576
  • Pages: 36-40

Access control system in cloud computing environment

Infocommunication Technologies
  • Year: 2012
  • Issue: 4
  • 0
  • 7244
  • Pages: 7-12

Insiders risk management in corporate information networks

Information and Signal Processing
  • Year: 2009
  • Issue: 3
  • 0
  • 6772
  • Pages: 35-40

Scientific-educational cluster as a modern form of professional education

Information and Telecommunication Technologies in Education
  • Year: 2012
  • Issue: 2
  • 0
  • 6555
  • Pages: 161-168

Access control with the help of Gödel’s encoding of virtual connections content

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2012
  • Issue: 2
  • 0
  • 7078
  • Pages: 104-109

Network centric access control model and methods in cloud computing systems

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2012
  • Issue: 2
  • 0
  • 6938
  • Pages: 91-95

Protection of information resources branch monitoring system and fishery database cryptographic technique

Information and Signal Processing
  • Year: 2012
  • Issue: 2
  • 0
  • 6600
  • Pages: 7-13

Data mining in a database of the antivirus protection management server

System Analysis and Control
  • Year: 2013
  • Issue: 1
  • 849
  • 8159
  • Pages: 44-49