Publication schedule
  • №3 September 2025
  • №4 December 2025

Articles by keywords "security"

Concept of ensuring the resilience of operation of national digital platforms and blockchain ecosystems under the new quantum threat to security

Intelligent Systems and Technologies, Artificial Intelligence
  • Year: 2025
  • Volume: 18
  • Issue: 2
  • 13
  • 175
  • Pages: 56-73

New types of threats and assessment of quantum stability of information systems in the field of foreign trade activity

Information Technologies
  • Year: 2024
  • Volume: 17
  • Issue: 4
  • 28
  • 994
  • Pages: 16-34

Ensuring confidence in control systems of technological equipment

Intelligent Systems and Technologies, Artificial Intelligence
  • Year: 2021
  • Volume: 14
  • Issue: 4
  • 24
  • 4556
  • Pages: 71-83

Techniques for hybridization of intelligent methods for detecting malicious traffic

Intelligent Systems and Technologies, Artificial Intelligence
  • Year: 2020
  • Volume: 13
  • Issue: 3
  • 22
  • 5510
  • Pages: 31-43

Information security objects modelling for risk assessment

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2009
  • Issue: 5
  • 0
  • 6775
  • Pages: 151-155

Security facilities construction and optimization based on risk analysis

System Analysis and Control
  • Year: 2011
  • Issue: 6
  • 1
  • 6921
  • Pages: 207-211

Technology Information Security of Large Museum and Exhibition Complexes

Circuits and Systems for Receiving, Transmitting and Signal Processing
  • Year: 2015
  • Issue: 6
  • 180
  • 7448
  • Pages: 14-24

Multi-level model with differential trust level to subjects for the distributed databases data security improving

Information and Signal Processing
  • Year: 2012
  • Issue: 6
  • 1
  • 6839
  • Pages: 54-58

Digital watermarks system for audio signals based on the reverberation effect

Information and Signal Processing
  • Year: 2012
  • Issue: 6
  • 0
  • 6639
  • Pages: 43-49

Ontological model for security of information-measuring technologies based on the common criteria

Devices, Information-measuring Systems
  • Year: 2010
  • Issue: 5
  • 1
  • 7078
  • Pages: 186-191

Software-based complex for information security risk assessment based on frame-production knowledge representation

Computer Systems and Software
  • Year: 2010
  • Issue: 5
  • 0
  • 6883
  • Pages: 98-102

Securing confidentiality of transmitted information at the network layer

Information and Signal Processing
  • Year: 2009
  • Issue: 4
  • 0
  • 6902
  • Pages: 60-65

Technology for protection of personal data using ORACLE DBMS

Information and Signal Processing
  • Year: 2012
  • Issue: 4
  • 0
  • 6578
  • Pages: 36-40

Access control system in cloud computing environment

Infocommunication Technologies
  • Year: 2012
  • Issue: 4
  • 0
  • 7247
  • Pages: 7-12

Heuristic network intrusion detection system prototype based on principal component analysis

Conference "Technologies Microsoft in the theory and programming practice"
  • Year: 2010
  • Issue: 4
  • 0
  • 7072
  • Pages: 200-204

Insiders risk management in corporate information networks

Information and Signal Processing
  • Year: 2009
  • Issue: 3
  • 0
  • 6774
  • Pages: 35-40

New generation of security information and event management systems

Infocommunication Technologies
  • Year: 2014
  • Issue: 3
  • 621
  • 7816
  • Pages: 7-18

An encryption algorithm using chaotic tent map security evaluation

Information and Signal Processing
  • Year: 2012
  • Issue: 3
  • 0
  • 6671
  • Pages: 23-27

Linear recurrent sequences on elliptic curve

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2010
  • Issue: 2
  • 0
  • 6843
  • Pages: 164-166

Scientific-educational cluster as a modern form of professional education

Information and Telecommunication Technologies in Education
  • Year: 2012
  • Issue: 2
  • 0
  • 6556
  • Pages: 161-168

Access control with the help of Gödel’s encoding of virtual connections content

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2012
  • Issue: 2
  • 0
  • 7080
  • Pages: 104-109

Network centric access control model and methods in cloud computing systems

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2012
  • Issue: 2
  • 0
  • 6941
  • Pages: 91-95

Protection of information resources branch monitoring system and fishery database cryptographic technique

Information and Signal Processing
  • Year: 2012
  • Issue: 2
  • 0
  • 6602
  • Pages: 7-13

Data mining in a database of the antivirus protection management server

System Analysis and Control
  • Year: 2013
  • Issue: 1
  • 849
  • 8163
  • Pages: 44-49