Publication schedule
-
№4 December 2025
-
№1 March 2026Submission deadline: 27 February 2026
-
№2 June 2026Submission deadline: 29 May 2026
-
№3 September 2026Submission deadline: 31 August 2026
Articles by keywords "security"
Concept of ensuring the resilience of operation of national digital platforms and blockchain ecosystems under the new quantum threat to security
- Year: 2025
- Volume: 18
- Issue: 2
- 22
- 2528
- Pages: 56-73
New types of threats and assessment of quantum stability of information systems in the field of foreign trade activity
- Year: 2024
- Volume: 17
- Issue: 4
- 30
- 3186
- Pages: 16-34
Ensuring confidence in control systems of technological equipment
- Year: 2021
- Volume: 14
- Issue: 4
- 24
- 5392
- Pages: 71-83
Techniques for hybridization of intelligent methods for detecting malicious traffic
- Year: 2020
- Volume: 13
- Issue: 3
- 22
- 6329
- Pages: 31-43
Information security objects modelling for risk assessment
- Year: 2009
- Issue: 5
- 0
- 7781
- Pages: 151-155
Security facilities construction and optimization based on risk analysis
- Year: 2011
- Issue: 6
- 1
- 7930
- Pages: 207-211
Technology Information Security of Large Museum and Exhibition Complexes
- Year: 2015
- Issue: 6
- 180
- 8258
- Pages: 14-24
Multi-level model with differential trust level to subjects for the distributed databases data security improving
- Year: 2012
- Issue: 6
- 1
- 7606
- Pages: 54-58
Digital watermarks system for audio signals based on the reverberation effect
- Year: 2012
- Issue: 6
- 0
- 7436
- Pages: 43-49
Ontological model for security of information-measuring technologies based on the common criteria
- Year: 2010
- Issue: 5
- 1
- 7767
- Pages: 186-191
Software-based complex for information security risk assessment based on frame-production knowledge representation
- Year: 2010
- Issue: 5
- 0
- 7777
- Pages: 98-102
Securing confidentiality of transmitted information at the network layer
- Year: 2009
- Issue: 4
- 0
- 7783
- Pages: 60-65
Technology for protection of personal data using ORACLE DBMS
- Year: 2012
- Issue: 4
- 0
- 7378
- Pages: 36-40
Heuristic network intrusion detection system prototype based on principal component analysis
- Year: 2010
- Issue: 4
- 0
- 7841
- Pages: 200-204
New generation of security information and event management systems
- Year: 2014
- Issue: 3
- 621
- 8546
- Pages: 7-18
An encryption algorithm using chaotic tent map security evaluation
- Year: 2012
- Issue: 3
- 0
- 7477
- Pages: 23-27
Scientific-educational cluster as a modern form of professional education
- Year: 2012
- Issue: 2
- 0
- 7318
- Pages: 161-168
Access control with the help of Gödel’s encoding of virtual connections content
- Year: 2012
- Issue: 2
- 0
- 8097
- Pages: 104-109
Network centric access control model and methods in cloud computing systems
- Year: 2012
- Issue: 2
- 0
- 7980
- Pages: 91-95
Protection of information resources branch monitoring system and fishery database cryptographic technique
- Year: 2012
- Issue: 2
- 0
- 7464
- Pages: 7-13
Data mining in a database of the antivirus protection management server
- Year: 2013
- Issue: 1
- 849
- 9216
- Pages: 44-49