Abstract is missing.
- Preface1-5 [doi]
- On variational problem with nonstandard growth conditions for the restoration of clouds corrupted satellite imagesPavel Khanenko, Peter I. Kogut, Mykola V. Uvarov. 6-25 [doi]
- Method of the software risks managementTetiana Hovorushchenko. 26-38 [doi]
- Assessing Risk of Enterprise Bankruptcy by Indicators of Financial and Economic Activity Using Bayesian NetworksSergiy Gnatyuk, Dinara Ospanova, Volodymyr Lytvynenko, Zhazira Amirgaliyeva, Nurali Nabot Shohiyon. 39-50 [doi]
- Research on the increase of information theory in the era of the ending of silicon electronics and new types of risksVolodymyr Hrytsyk, Mariia Nazarkevych. 51-64 [doi]
- Adaptation of a risk-based approach to the tasks of building and functioning of information security systemsOleksandr Arkhypov, Yevheniia Arkhypova, Jan Krejci. 65-82 [doi]
- Spatially-distributed multi-hazard risk analysisMaryna Zharikova, Gonzalo Barbeito, Marian Sorin Nistor, Stefan Wolfgang Pickl. 83-92 [doi]
- Risk modeling during complex dynamic system evolution using abstract event network modelVolodymyr Sherstjuk, Maryna Zharikova, Ibraim Didmanidze, Irina Dorovskaja, Svitlana Vyshemyrska. 93-110 [doi]
- Situation diagnosis based on multi-hazard risk assessment (short paper)Maryna Zharikova, Andrzej Smolarz, Pawel Komada, Volodymyr Sherstyuk, Bohdan Sakovych. 111-118 [doi]
- Computing the risk of failures for high-temperature pressurized pipelinesViktor Mashkov, Igor Nevliudov, Yurii Romashov. 119-136 [doi]
- Hyperplane clasterization of the small data based on pseudo-inverse and projective matrices (short paper)Iurii Krak, Hrygorii Kudin, Mykola Efremov, Alexander Samoylov, Vladislav A. Kuznetsov, Yedilkhan Amirgaliyev, Veda Kasianiuk. 137-145 [doi]
- Method of construction of fuzzy tree of solutions for network protection against DoS-attacksOleksandr Tymchenko, Bohdana Havrysh, Andrian Kobevko, Orest Khamula. 146-157 [doi]
- Forecasting the reader's demand level based on factors of interest in the bookVsevolod Senkivskyy, Sergii Babichev, Iryna Pikh, Alona Kudriashova, Nataliia Senkivska, Iryna Kalynii. 158-175 [doi]
- Neural network modeling method of transformations data of audit production with returnable wasteTatiana Neskorodieva, Eugene Fedorov, Pavlo Rymar, Oleksii Smirnov. 176-191 [doi]
- Reconstruction of acoustic surfaces from incomplete data as an identification problem based on fuzzy relationsOlexiy Azarov, Leonid Krupelnitskyi, Hanna Rakytyanska, Jan Fesl. 192-207 [doi]
- Using recurrent neural network to noise absorption from audio filesNataliya Boyko, Anastasiia Hrynyshyn. 208-226 [doi]
- Application of semantic segmentation of clouds of points for preservation of cultural heritageNataliya Boyko, Mariia Rizhko. 227-240 [doi]
- The use of a neural network to minimize the risks of positive assessment of academically dishonest studentsVolodymyr Sherstjuk, Libor Dostálek, Raisa Zakharchenko, Leonid Zakharchenko, Olena Shtutsa, Kostiantyn Sokol. 245-252 [doi]
- Novel test for survival data analysis of cancer patients (short paper)Dmitriy Klyushin, Pavel Yakovlev. 253-259 [doi]
- Risk analysis of personal data loss in wireless sensor networksAnastasiya Doroshenko, Kvitoslava Obelovska, Olha Bilyk. 260-274 [doi]
- Mathematical model and method of enterprise financial risk assessment based on threshold elementsOrken Mamyrbayev, Anzhelika Azarova, Liliia Nikiforova, Aliya Kalizhanova, Anatolii Shyian, Olga Ruzakova, Nataliia Savina. 275-291 [doi]
- Risk of Information Loss using JWT token (short paper)Oleksandra S. Bulgakova, Viktor Mashkov, Viacheslav V. Zosimov, Pavlo Popravkin. 292-299 [doi]
- Assessment and information security provision of the decision support process in technogenic object management systemsViktor Perederyi, Eugene Borchik, Waldemar Wójcik, Oksana Ohnieva. 300-313 [doi]
- Geo-informational approach to risk analysis of slope mass movement (short paper)Sergii Babichev, Tetiana V. Kril, Stella B. Shekhunova, Waldemar Wójcik. 314-321 [doi]
- Risk of mid-air collision estimation using minimum spanning tree of air traffic graphIvan Ostroumov, Oleg Ivashchuk, Sergii Babichev. 322-334 [doi]
- Enhancement of the methodology for the selection of the optimal location of the Remote Tower CentreTetiana Shmelova, Nina Rizun, Svitlana Kredentsar, Maksym Yastrub. 335-346 [doi]
- Models of decision-making by the pilot in emergency "Engine failure during take-off"Tetiana Shmelova, Antonio Chialastri, Yuliya Sikirda, Maxim Yatsko. 347-365 [doi]
- Development of a mobile application for calculation of fire risks in the Android Studio environment (short paper)Svitlana Bordiuzhenko, Oleksandr Sobol, Olena Liashevska, Dimiter Velev, Plamena Zlateva. 366-373 [doi]
- Information technologies for operational staff training for man-made systems under threats and risksJan Fesl, Lyubov Tupychak, Lubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Olga Fedevych. 374-387 [doi]
- Designing risk resilient networked high-load computing web-systems for information flow processingNadia Pasieka, Zora Ríhová, Marta Vohnoutová, Nelly Lysenko, Oleksandra Lysenko, Vasyl Sheketa, Mykola Pasyeka, Nataliia Kulchytska. 388-403 [doi]
- Information technology of risk assessment for automated control systems of printing productionLubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Volodymyr Sabat, Olga Fedevych. 404-418 [doi]
- Cognitive and information decision-making technologies and risk assessment in technogenic systemsLubomir Sikora, Natalia Lysa, Jan Krejcí, Rostislav Tkachuk, Olga Fedevych. 419-433 [doi]
- Using hash functions to protect critical messages from changes in risky computing systemsAndrzej Smolarz, Nadia Pasieka, Andrzej Kotyra, Vasyl Sheketa, Mykola Pasieka, Svitlana Chupakhina, Petro Krul, Mykola Suprun. 434-444 [doi]