Publication schedule
-
№4 December 2025
-
№1 March 2026Submission deadline: 27 February 2026
-
№2 June 2026Submission deadline: 29 May 2026
-
№3 September 2026Submission deadline: 31 August 2026
Articles by keywords "security"
Concept of ensuring the resilience of operation of national digital platforms and blockchain ecosystems under the new quantum threat to security
- Year: 2025
- Volume: 18
- Issue: 2
- 21
- 2358
- Pages: 56-73
New types of threats and assessment of quantum stability of information systems in the field of foreign trade activity
- Year: 2024
- Volume: 17
- Issue: 4
- 30
- 3051
- Pages: 16-34
Ensuring confidence in control systems of technological equipment
- Year: 2021
- Volume: 14
- Issue: 4
- 24
- 5279
- Pages: 71-83
Techniques for hybridization of intelligent methods for detecting malicious traffic
- Year: 2020
- Volume: 13
- Issue: 3
- 22
- 6212
- Pages: 31-43
Information security objects modelling for risk assessment
- Year: 2009
- Issue: 5
- 0
- 7680
- Pages: 151-155
Security facilities construction and optimization based on risk analysis
- Year: 2011
- Issue: 6
- 1
- 7827
- Pages: 207-211
Technology Information Security of Large Museum and Exhibition Complexes
- Year: 2015
- Issue: 6
- 180
- 8138
- Pages: 14-24
Multi-level model with differential trust level to subjects for the distributed databases data security improving
- Year: 2012
- Issue: 6
- 1
- 7499
- Pages: 54-58
Digital watermarks system for audio signals based on the reverberation effect
- Year: 2012
- Issue: 6
- 0
- 7328
- Pages: 43-49
Ontological model for security of information-measuring technologies based on the common criteria
- Year: 2010
- Issue: 5
- 1
- 7666
- Pages: 186-191
Software-based complex for information security risk assessment based on frame-production knowledge representation
- Year: 2010
- Issue: 5
- 0
- 7665
- Pages: 98-102
Securing confidentiality of transmitted information at the network layer
- Year: 2009
- Issue: 4
- 0
- 7668
- Pages: 60-65
Technology for protection of personal data using ORACLE DBMS
- Year: 2012
- Issue: 4
- 0
- 7273
- Pages: 36-40
Heuristic network intrusion detection system prototype based on principal component analysis
- Year: 2010
- Issue: 4
- 0
- 7736
- Pages: 200-204
New generation of security information and event management systems
- Year: 2014
- Issue: 3
- 621
- 8435
- Pages: 7-18
An encryption algorithm using chaotic tent map security evaluation
- Year: 2012
- Issue: 3
- 0
- 7364
- Pages: 23-27
Scientific-educational cluster as a modern form of professional education
- Year: 2012
- Issue: 2
- 0
- 7217
- Pages: 161-168
Access control with the help of Gödel’s encoding of virtual connections content
- Year: 2012
- Issue: 2
- 0
- 7976
- Pages: 104-109
Network centric access control model and methods in cloud computing systems
- Year: 2012
- Issue: 2
- 0
- 7857
- Pages: 91-95
Protection of information resources branch monitoring system and fishery database cryptographic technique
- Year: 2012
- Issue: 2
- 0
- 7361
- Pages: 7-13
Data mining in a database of the antivirus protection management server
- Year: 2013
- Issue: 1
- 849
- 9099
- Pages: 44-49