Abstract is missing.
- Modern Approaches to Software Optimization MethodsIgor Zhukov, Oleksii Synelnikov, Olena Chaikovska, Serhiy Dorozhynskyi. 1-10 [doi]
- Development Principles of Secure MicroservicesOleksandr Tereshchenko, Natalia Trintina. 11-20 [doi]
- Information Security System in Provision of the Economic Security and Risk Management of the EnterpriseEuvgenia Nosova, Lyudmyla Anisimova, Tetiana Murovana, Yulia Sviatiuk, Olena Iafinovych. 21-31 [doi]
- Optimization Algorithms of Smart City Wireless Sensor Network ControlMykyta Moshenchenko, Bohdan Zhurakovskyi, Vadym Poltorak, Andrii Bondarchuk, Nataliia Korshun. 32-42 [doi]
- Biometric Protection Information System with Extension of Segmentation MethodsMariia Nazarkevych, Volodymyr Hrytsyk, Maryna Kostiak, Lyubomyr Parkhuts, Hanna Nazarkevych. 43-52 [doi]
- Аnalysis of Corporate Culture Development Parameters in the Telecommunication Enterprise InformationsOleksandr Trush, Mariy Trush, Oleh Shincaruk, Hryhorii Radzivilov, Tetiana Opryshko. 53-62 [doi]
- Solvency Management in the Financial Security System of Housing and Communal ServicesIryna Kreidych, leksandr Kharchenko, Oksana Kazak. 63-75 [doi]
- IT Team Building Process Management based on a Competency ApproachVyktoriia Marhasova, Stanislav Maliar, Mukola Ivanov, Olga Garafonova, Olena Kozyrieva. 76-87 [doi]
- Behavioral Biometry as a Cyber Security ToolMaryna Chyzhevska, Nataliia Romanovska, Andrii Ramskyi, Vitalii Venger, Mykola Obushnyi. 88-97 [doi]
- Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance LearningOleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Ievgeniia Kuzminykh, Amal Mersni. 98-107 [doi]
- SDR Receivers as a New Challenge to Cybersecurity Wireless TechnologyRoman Bybyk, Ivan Opirskyy, Mike McIntosh. 108-119 [doi]
- Particle Swarm Optimization based on S-Boxes GenerationAlexandr Kuznetsov, Yaroslav Derevianko, Nikolay Poluyanenko, Oleksandr Bagmut. 120-134 [doi]
- Synthesis of the System of Iterative Dynamic Risk Assessment of Information SecurityDenis Berestov, Oleg Kurchenko, Yuri Shcheblanin, Volodymyr Mishchenko, Nataliia Mazur. 135-148 [doi]
- Modern SIEM Analysis and Critical Requirements Definition in the Context of Information WarfareSergiy Gnatyuk, Rat Berdibayev, Andriy Fesenko, Olha Kyryliuk, Anatoly Bessalov. 149-166 [doi]
- Diceware Password Generation Algorithm Modification based on Pseudo-Random SequencesSerhii Buchyk, Nataliia Lukova-Chuiko, Serhii Toliupa, Vitalii Piatyhor, Oleksandr Buchyk. 167-176 [doi]
- Method of Tabular Implementation for Diagnostics of Non-Positional Code Structures in the System of Residual ClassesVictor Krasnobayev, Alexander Kuznetsov, Mykhaylo Bagmut, Ludmila Gorbacheva, Tetiana Kuznetsova. 177-186 [doi]
- The Impact of the Covid-19 Pandemic on Students Studying in High Education InstitutionsMariia Nazarkevych, Volodymyr Hrytsyk, Anzhela Kuza, Oleksii Shevchuk, Maryna Kostiak. 187-196 [doi]
- Decentralized Access Demarcation System Construction in Situational Center NetworkViktor Grechaninov, Hennadii Hulak, Evgen Hulak, Pavlo Skladannyi, Volodymyr Sokolov. 197-206 [doi]
- Practice of Application of Latest Digital Technologies (short paper)Kateryna Kraus, Nataliia Kraus. 207-213 [doi]
- Risk Assessment Information System of Enterprise Business Processes (short paper)Eleonora Tereshchenko, Olga Sosnovska, Natalya Ushenko, Viktoriya Andryeyeva, Mariia Kovalova. 214-220 [doi]
- Economic Security Parameters in the Conditions of Increasing Information Risks and Threats (short paper)Anatolii Sunduk, Yuliia Zhukova, Pavlo Shvets, Valeriia Loiko. 221-228 [doi]
- Honeypot Security Efficiency versus Deception Solution (short paper)Sviatoslav Vasylyshyn, Ivan Opirskyy, Svitlana Shevchenko. 229-236 [doi]
- Investigation of the Effect of Harmonic Interference on the Error with Frequency Conversion of Energy Supply Systems on Water Transport Vehicles (short paper)Larysa Hatsenko, Sergey Herasimov, Serhii Pohasii. 237-243 [doi]
- Cybersecurity Startup Investments (short paper)Tetiana Moiseienko, Anastasiia Kiva. 244-250 [doi]
- Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper)Vasyl Ustimenko, Oleksandr Pustovit. 251-256 [doi]
- Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact (short paper)Zoreslava Brzhevska, Roman Kyrychok, Andrii Anosov, Pavlo Skladannyi, Maksym Vorokhob. 257-264 [doi]
- Parameters of Aiming Interfering Signals for Information Protection from Leaks by High-Frequency Channel Imposition (short paper)Larysa Kriuchkova, Maksym Vovk, Ivan Tsmokanych, Denys Tarasenko. 265-272 [doi]
- Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity (short paper)Vasyl Buhas, Ihor Ponomarenko, Vlriy Bugas, Andrii Ramskyi, Volodymyr Sokolov. 273-281 [doi]
- Stability Method of Connectivity Automated Calculation for Heterogeneous Telecommunication Network (short paper)Pavlo Anakhov, Viktoriia Zhebka, Nataliia Korshun, Alina Tushych, Tymur Dovzhenko. 282-287 [doi]