Abstract is missing.
- New Technique for Data Hiding in Cover Images Using Adaptively Generated Pseudorandom SequencesAlexandr Kuznetsov, Oleksii Smirnov, Diana Kovalchuk, Tetiana Kuznetsova. 1-14 [doi]
- Towards Trust in Digital Services Advertisements - Buying Experts' Opinions on USDL-TrustWolfgang Bauer, Natalia Kryvinska, Jürgen Dorn. 15-31 [doi]
- Simulation of a Double Spending Attack on the Proof of Work Consensus ProtocolNikolay Poluyanenko, Nadia Pisarenko, Vladyslav Safonenko, Tymur Makushenko, Olha Pushko, Yevhena Zaburmekha, Kateryna Kuznetsova. 32-59 [doi]
- Method of Optimal Planning of Cyberprotection Actions for a Corporate Information SystemAleksandr Litvinenko, Boris Maslovsky, Oleksiy Glazok, Anton Petrov. 60-71 [doi]
- Improved Gentry's Fully Homomorphic Encryption Scheme: Design, Implementation and Performance EvaluationSvitlana Kazmirchuk, Anna Ilyenko, Sergii Ilyenko, Yakovenko Olesya, Marharyta Herasymenko, Maksim Iavich. 72-83 [doi]
- Development of the Support Information System of the UniversityAndriy Andrukhiv, Maria Sokil, Alina Petrushka, Yuriy Syerov. 84-95 [doi]
- Nonlinear Properties of Rijndael S-boxes Represented by the Many-Valued Logic FunctionsArtem Sokolov, Djiofack Temgoua Vanssa Noel. 96-106 [doi]
- Biometric Images Attacks Detecting Using Convolutional Neural NetworksKyrylo Chernov, Kateryna Kuznetsova, Inna Oleshko, Mykhaylo Bagmut, Alexandr Fedorchuk, Dmytro Kryzhanovskyi. 107-121 [doi]
- Pseudorandom Sequences for Spread Spectrum Image SteganographyAlexandr Kuznetsov, Oleksii Smirnov, Anna Arischenko, Iryna Chepurko, Alexander Onikiychuk, Tetiana Kuznetsova. 122-131 [doi]
- Cyber Object State Maximal Probability Timing Obtained Through Multi-Optional TechniqueAndriy Goncharenko. 132-143 [doi]
- Efficiency Evaluation of the Design of Polygraphy Products in the Company Online MarketingSolomia Fedushko, Anna Dmytriv, Svitlana Topylko, Nataliia Buchii. 144-154 [doi]
- Implementation of Social Engineering Attack at Institution of Higher EducationZhengbing Hu, Volodymyr Buriachok, Volodymyr Sokolov. 155-164 [doi]
- Generalized Pseudorandom Generators of the Galois and Fibonacci SequencesAnatoly Beletsky. 165-181 [doi]
- Economic Efficiency of Innovative Projects of CNN Modified Architecture ApplicationViktor Khavalko, Andriana Mazur, Vladyslav Mykhailyshyn, Roman Zhelizniak, Iryna Kovtyk. 182-193 [doi]
- Development of a Method of Encoding a Significant Coordinate Brightness Component of a Video ImageVladimir Barannik, Oleksandr Yudin, Anton Sorokun, Maksym Parkhomenko, Viktoria Himenko. 194-203 [doi]
- Analytical Links in the Tasks of Digital Content CompressionOlena Kolganova, Viktoriia Kravchenko, Lidiia Tereshchenko, Volodymyr Shutko, Mykola Shutko, Yevhen Vasiliu. 204-214 [doi]
- E-law and E-justice: Analysis of the Switzerland ExperienceSolomiia Fedushko, Nataly Ortynska, Yuriy Syerov, Ruslan Kravets. 215-226 [doi]
- Investigation of Tensor Approach for Providing Multimedia Quality in Infocommunication NetworksMaryna Yevdokymenko. 227-239 [doi]
- Analyzing Digital Image Processing Capabilities while Growing CropsTamara Oleshko, Dmytro Kvashuk, Yuliia Boiko, Roman Odarchenko, Valerii Krainov. 240-250 [doi]
- Methods for Assessing the Maturity Levels of Software EcosystemsSvitlana Popereshnyak, Sergiy Grinenko, Olena Grinenko, Oleksandr Kovalenko, Tamara Radivilova. 251-261 [doi]
- Informational Technology for the Improvement of Flight Zone SecurityOlena Kozhokhina, Olga Shcherbyna, Oleksii Chuzha, Serhii Yehorov, Maksim Iavich, Nikolay Churkin. 262-275 [doi]
- Study on 1C Typical Configurations and the Problem of their ModificationTetiana Fursenko, Nataliia Paziura, Elizabeth Isakova, Nelly Nychkalo, Oksana Duksenko, Olga Veselska. 276-287 [doi]
- Advanced selection of ideal building blocks for ''smart'' biocompatible surfaces: prediction and study of polymer properties and streaming video recognition method for observation of the cellular behavior and economic effectYurij Stetsyshyn, Yurii Kryvenchuk, Yuliia Chyrkova, Tetiana Helzhynska, Pylyp Skoropad, Liubomyr Pohreliuk, Yurij Panchenk. 288-303 [doi]
- Method for Encoding Video Frame Fragments Based on Non-Equilibrium Codes with Minimization of Service DataYuriy Ryabukha, Dmitry Barannik, Vitaliy Tverdokhlib, Valeriy Barannik, Oleg Kulitsa, Emil Faure, Roman Odarchenko. 304-314 [doi]
- Comparative Analysis of Modern Formats of Lossy Audio CompressionBohdan Zhurakovskyi, Nataliia Tsopa, Yevhenii Batrak, Roman Odarchenko, Tetiana Smirnova. 315-327 [doi]
- Usage of Machine-based Translation Methods for Analyzing Open Data in Legal CasesNataliya Boyko, Lesia Mochurad, Uliana Parpan, Oleh Basystiuk. 328-338 [doi]
- Tomographic Application-Specific Integrated Circuits for Fast Radon TransformationOleksandr Ponomarenko, Anna Bulakovskaya, Andrii Skripnichenko, Jugoslav Achkoski, Pavel Usik, Alexandr Olenyuk. 339-351 [doi]
- Optimal Configuration and Typical Size of Images Re-ceived by Unmanned Aerial Vehicles during MonitoringHanna Polozhevets, Oleksandr Sytnik, Dariia Ovcharenko, Yurii Vitruck, Vladyslav Kovtun. 352-362 [doi]
- Operation System for Modern Unmanned Aerial VehiclesOleksandr Solomentsev, Maksym Zaliskyi, Pavlo Skladannyi. 363-374 [doi]
- Scientific Content: Language Expansion in Bibliometric DatabasesAlina Petrushka, Maria Komova, Solomia Fedushko. 375-389 [doi]
- Method of Direct Diagnostic Problem Solution in UAV Operation SystemIvan Yashanov, Marlen Asanov, Nataliya Shakhovska. 390-401 [doi]
- Methods for Obtaining of Management Decisions during Evaluating the Controlled Parameters by Qualitative CategoriesJamil Al-Azzeh, Alexandr Litvinenko, Dmytro Kucherov, Ivan-Farkhod Kashkevych, Zhenis Bagisov. 402-420 [doi]
- Cybercrime as a Threat to the Banking System of Ukraine and Cryptology as a Means of its PreventionMarian Bedrii, Maryana Syrko, Oksana Stolyar, Oleh Kuzmin, Yurii Kryvenchuk. 421-431 [doi]
- Data Mining Usage for Social NetworksHanna Martyniuk, Serhii Lazarenko, Valeriy Kozlovskiy, Yuriy Balanyuk, Ivan Yakoviv, Pavlo Skladannyi. 432-443 [doi]
- Cost-Effective Use of Mathematical Methods for the Organization and Management of Data in the CloudNataliya Boyko, Lesia Mochurad, Oksana Chervinska. 444-457 [doi]
- Cryptographic Semantic System for Provision of the Performance Mode of Perfect StrongYevgen Samojlik, Viktor Gnatyuk, Volodymyr Klimchuk, Oleksii Shylo, Oleksandr Tkachenko, Yuliia Burmak. 458-470 [doi]
- Building a Computer Model of an Acoustic Signal Recognition DeviceGennadii Sokolov, Yuriy Syerov. 471-491 [doi]
- Problems of legal regulation of support in the implementation of control operations in Ukraine and information technology to solve this problemVolodymyr Reshota, Roman Dzhokh, Olena Reshota, Yurii Kryvenchuk. 492-503 [doi]
- The Research of Realization of Hidden Channel for Information Transmission with the Use of Steganographic ToolsGeorgiy Konakhovich, Yaroslav Symonychenko, Anna Symonychenko, Yousef Ibrahim Daradkeh. 504-514 [doi]
- Data Protection Method of an Unmanned Aerial Vehicle based on Obfuscation ProcedureSerhii Semenov, Denys Voloshyn, Viacheslav Davydov. 515-525 [doi]
- Two-factor User Authentication Using BiometricsViacheslav Liskin, Egor Serdobolskiy, Iryna Sopilko, Tetiana Okhrimenko. 526-535 [doi]
- Improvement of Implementation of Merkle Crypto SystemMaksim Iavich, Arturo Arakelian, Giorgi Iashvili, Dali Magrakvelidze, Tetiana Okhrimenko. 536-545 [doi]
- Artificial Intelligence Technologies Using in Social Engineering AttacksNatalia Ryabchuk, Nina Grishko, Vladislav Grishko, Andriy Rudenko, Valentyn Petryk, Ideyat Bapiyev, Solomiia Fedushko. 546-555 [doi]
- Information Technology for Formation and Implementation of the Personal Trajectory of a Future Specialist's Success in the Information and Educational EnvironmentElvira Luzik, Anzhelika Kokarieva, Olena Hurska, Olga Veselska, Tetiana Konivitska. 556-570 [doi]
- Organizational and Legal Aspects of Managing the Process of Recognition of Objects in the ImageNataliya Boyko, Lesia Mochurad, Iryna Andrusiak, Yurii Drevnytskyi. 571-592 [doi]
- Information Model of Ecological Systems on the Basis of Reliability and Radiocapacity with Application of GIS TechnologiesIryna Matvieieva, Valentyna Groza, Lesia Pavliukh, Yurii Rudyak, Yousef Ibrahim Daradkeh. 593-603 [doi]
- Research by statistical methods of models of the function of transformation of optical circuits of the means of measuring the temperature based on the effect of RamanYurii Kryvenchuk, Iryna Shvorob, Y. Novytskyi, Y. Zasoba, Y. Matviychuk, V. Mykhailyshyn, N. Hrabovs'ka, N. Topylko, Mykhailo Osypov, H. Yakymyshyn. 604-627 [doi]
- Public-Private Partnership in CybersecurityVitalii Kruhlov, Mykola Latynin, Alina Horban, Anton Petrov. 619-628 [doi]
- Comparative Analysis of E-Democracy Implementation in Ukraine and SwitzerlandOksana Onyshchuk, Solomiia Fedushko, Yuriy Syerov. 629-628 [doi]
- Cryptographic Key Exchange Method for Data Factorial CodingEmil Faure, Anatoly Shcherba, Yevhen Vasiliu, Andriy Fesenko. 643-664 [doi]
- Incidents Correlation Mechanism for Assessing Average and Total Criticality Level of Situation in the InfosphereAndrii Gizun, Alexey Pisarchuk, Vladyslav Hriha, Volodymyr Buriachok, Rat Berdibayev. 654-664 [doi]
- Strategic terminal integration of game system and information resource consepts as a basis of analysis of energy active interaction of technogenic and ecological systemsLubomir Sikora, Natalia Lysa, Rostislav Tkachuk, Valentine Kunchenko-Kharchenko, Yurii Kryvenchuk. 665-679 [doi]
- Study on Complex Assessment of the Information and Communication Systems EfficiencySergii Ye. Gnatiuk, Lev Sakovych, Yaroslav Evchenko, Valerii Yakovliev, Tetiana Okhrimenko, Aleksei Klochkovskii. 680-691 [doi]
- Bifurcation Prediction Method for the Emergence and Development Dynamics of Information Conflicts in Cybernetic SpaceOleksii Pysarchuk, Andriy Gizun, Andrii Dudnik, Vladyslav Griga, Tetyana Domkiv, Sergiy Gnatyuk. 692-709 [doi]
- Informational Support of Effective Work of the Community Manager with Web CommunitiesOleksandr Markovets, Ruslana Pazderska, Oksana Horpyniuk, Yuriy Syerov. 710-722 [doi]
- Methods of Primary Processing Handwriting Samples at User Authentication Using a Probabilistic Neural NetworkAnatolii Davydenko, Olena Vysotska, Tetiana Shmelova. 723-735 [doi]
- Digital Content Processing Method for Biometric Identification of Personality Based on Artificial Intelligence ApproachesEugene Fedorov, Tetyana Utkina, Kostiantyn Rudakov, Andriy Lukashenko, Serhii Mitsenko, Maryna Chychuzhko, Valentyna Lukashenko. 736-747 [doi]
- Comparative Analysis of Two Approaches to the Clustering of Respondents (Based on Survey Results)Iryna Strutynska, Halyna Kozbur, Lesia Dmytrotsa, Olha Hlado, Liliya Melnyk, Marek Aleksander. 748-761 [doi]
- Devices for Modular Multiplication of Numbers with Analysis of Two Least Significant Bits of the MultiplierSakhybay Tynymbayev, Rat Berdibayev, Turganbek Omar, Sergiy Gnatyuk, Timur Namazbayev, Sairan Adilbekkyzy. 762-772 [doi]
- System for Monitoring the Connection of USB Devices for Cybersecurity AuditingVadym Kalchenko, Nataliia Barchenko, Andrii Tolbatov, Victor Obodiak, Volodymyr Tolbatov, Vadym Tatarinov, Sergiy Gnatyuk. 773-785 [doi]
- Method of Improving the Stability of Network Synchronization in Multiservice Macro NetworksYurii Khlaponin, Elissawi Kamal Khalifa, Dmytro Khlaponin, Alexander Selyukov, Andrii Tolbatov, Volodymyr Tolbatov, Roman Odarchenko. 786-797 [doi]
- Experimental Identification of the Critical Information Infrastructure Objects in AviationSergiy Gnatyuk, Viktoriia Sydorenko, Iuliia Goncharenko, Yuliia Sotnichenko, Nurgul Seilova, Dinara Basshykyzy. 798-809 [doi]
- Method for Choosing Secure Cloud Computing on the Platform of PaaS for the State Agencies ServicesK. Shakerkhan, M. Kuttykadamov, S. Koibagarov, R. Duiskenova, Zh. Baibussinova, V. Sydorenko. 810-826 [doi]
- Experimental Research of the Developed Methods of Arithmetic Operations in Cryptographic Transformations according to the ECDSA SchemeAndrew Okhrimenko, Vladyslav Kovtun. 827-837 [doi]
- Design with Preset Parameters and Reliability Assessment of Single Level Personal Data Protection SystemBorys Zhurylenko, Kirill Nikolaev, Marek Aleksander. 838-849 [doi]