Publication schedule
  • №4 December 2024
  • №1 March 2025
  • №2 June 2025
  • №3 September 2025

Articles by keywords "security"

Ensuring confidence in control systems of technological equipment

Intellectual Systems and Technologies
  • Year: 2021
  • Volume: 14
  • Issue: 4
  • 24
  • 3715
  • Pages: 71-83

Techniques for hybridization of intelligent methods for detecting malicious traffic

Intellectual Systems and Technologies
  • Year: 2020
  • Volume: 13
  • Issue: 3
  • 22
  • 4651
  • Pages: 31-43

Information security objects modelling for risk assessment

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2009
  • Issue: 5
  • 0
  • 5921
  • Pages: 151-155

Security facilities construction and optimization based on risk analysis

System Analysis and Control
  • Year: 2011
  • Issue: 6
  • 1
  • 6070
  • Pages: 207-211

Technology Information Security of Large Museum and Exhibition Complexes

Circuits and Systems for Receiving, Transmitting and Signal Processing
  • Year: 2015
  • Issue: 6
  • 180
  • 6526
  • Pages: 14-24

Multi-level model with differential trust level to subjects for the distributed databases data security improving

Information and Signal Processing
  • Year: 2012
  • Issue: 6
  • 1
  • 6037
  • Pages: 54-58

Digital watermarks system for audio signals based on the reverberation effect

Information and Signal Processing
  • Year: 2012
  • Issue: 6
  • 0
  • 5802
  • Pages: 43-49

Ontological model for security of information-measuring technologies based on the common criteria

Devices, Information-measuring Systems
  • Year: 2010
  • Issue: 5
  • 1
  • 6008
  • Pages: 186-191

Software-based complex for information security risk assessment based on frame-production knowledge representation

Computer Systems and Software
  • Year: 2010
  • Issue: 5
  • 0
  • 6063
  • Pages: 98-102

Securing confidentiality of transmitted information at the network layer

Information and Signal Processing
  • Year: 2009
  • Issue: 4
  • 0
  • 6093
  • Pages: 60-65

Technology for protection of personal data using ORACLE DBMS

Information and Signal Processing
  • Year: 2012
  • Issue: 4
  • 0
  • 5823
  • Pages: 36-40

Access control system in cloud computing environment

Infocommunication Technologies
  • Year: 2012
  • Issue: 4
  • 0
  • 6354
  • Pages: 7-12

Heuristic network intrusion detection system prototype based on principal component analysis

Conference "Technologies Microsoft in the theory and programming practice"
  • Year: 2010
  • Issue: 4
  • 0
  • 5962
  • Pages: 200-204

Insiders risk management in corporate information networks

Information and Signal Processing
  • Year: 2009
  • Issue: 3
  • 0
  • 5942
  • Pages: 35-40

New generation of security information and event management systems

Infocommunication Technologies
  • Year: 2014
  • Issue: 3
  • 620
  • 6984
  • Pages: 7-18

An encryption algorithm using chaotic tent map security evaluation

Information and Signal Processing
  • Year: 2012
  • Issue: 3
  • 0
  • 5824
  • Pages: 23-27

Linear recurrent sequences on elliptic curve

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2010
  • Issue: 2
  • 0
  • 5947
  • Pages: 164-166

Scientific-educational cluster as a modern form of professional education

Information and Telecommunication Technologies in Education
  • Year: 2012
  • Issue: 2
  • 0
  • 5801
  • Pages: 161-168

Access control with the help of Gödel’s encoding of virtual connections content

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2012
  • Issue: 2
  • 0
  • 6186
  • Pages: 104-109

Network centric access control model and methods in cloud computing systems

Mathematical Modelling: Methods, algorithms, technologies
  • Year: 2012
  • Issue: 2
  • 0
  • 6062
  • Pages: 91-95

Protection of information resources branch monitoring system and fishery database cryptographic technique

Information and Signal Processing
  • Year: 2012
  • Issue: 2
  • 0
  • 5763
  • Pages: 7-13

Data mining in a database of the antivirus protection management server

System Analysis and Control
  • Year: 2013
  • Issue: 1
  • 849
  • 7264
  • Pages: 44-49