Abstract is missing.
- Development of a Method for Detecting Deviations in the Nature of Traffic from the Elements of the Communication NetworkOleksandr Laptiev, Nataliia Lukova-Chuiko, Serhii Laptiev, Tetiana Laptieva, Vitaliy Savchenko, Serhii Yevseiev. 1-9 [doi]
- Using the Sum of Real Type Functions to Encrypt MessagesViktor Avramenko, Mykyta Bondarenko. 10-17 [doi]
- Method Of Recognition Sarcasm In English Communication With The Application Of Information TechnologiesSerhii Trystan, Olha Matiushchenko, Maryna Naumenko. 18-23 [doi]
- Method of Calculation of Information Protection from Clusterization Ratio in Social NetworksVitalii Savchenko, Volodymyr Akhramovych, Oleksander Matsko, Ivan Havryliuk. 24-31 [doi]
- Modification of Query Processing Methods in Distributed Databases Using Fractal TreesOlha Svynchuk, Andrii Barabash, Serhii Laptiev, Tetiana Laptieva. 32-37 [doi]
- Detection of Slow DDoS Attacks Based on Time Delay ForecastingVitalii Savchenko, Valeriia Savchenko, Oleksandr Laptiev, Oleksander Matsko, Ivan Havryliuk, Kseniia Yerhidzei, Iryna Novikova. 38-46 [doi]
- Peculiar Properties of Creating a System of Support to Make Anti- Crisis Decisions by Experts of the Situational Center at the Cyber Protection ObjectVadym Tiutiunyk, Olha Tiutiunyk, Oleh Teslenko, Natalia Brynza. 47-56 [doi]
- The Basic Principles of the Compact Video Frames Representation Technology, Which are Presented in a Differential Form in Computer SystemsOleksandr Tymochko, Maksim Pavlenko, Volodymyr Larin. 57-61 [doi]
- Protection of Numerical Information Based on PermutationsOleksiy A. Borysenko, Oleksii Y. Horiachev, Viktor V. Serdyuk, Andriy O. Horyshnyak, Oleksandr M. Kobyakov, Olga V. Berezhna. 62-67 [doi]
- Methodical Approach to the Development of a Mathematical Model for Calculating the Combat Potentials of Strike Unmanned AircraftDmytro Ikaiev, Yaroslav Yaroshenko, Andrii Shalyhin, Volodymyr Nerubatskyi, Valerii Bondar, Volodymyr Herasymenko. 68-73 [doi]
- Determining the Required Number of Information Channels Based on the Information Dissemination ModelOleksandr Voitko, Volodymyr Cherneha, Vladislav Solonnikov, Olena Poliakova, Roman Korolyov. 74-79 [doi]
- The Criterion of the Effective Use of Energy Resources While Producing Plant Products of Specified QualityVitaliy Lysenko, Valerii Koval, Igor Bolbot, Taras Lendiel, Kateryna Nakonechna, Anastasija Bolbot. 80-85 [doi]
- Problems of Analysis and Forecasting of Information and Psychological Influences in Social NetworksMykola Brailovskyi, Serhii Toliupa. 86-91 [doi]
- Methods for Assessing the Risk of Approaching Ships as an Integral Part of the Vessel Traffic Control SystemVictor Strelbitskyi, Nataliia Punchenko, Oleksandra Tsyra. 92-96 [doi]
- Model of the System for Special Purpose of Critical Infrastructure ObjectsMikolaj P. Karpinski, Bogdan Tomashevsky, Natalia Zahorodna, Serhii Yevseiev, Stanislaw Andrzej Rajba, Oleksandr Milov. 97-106 [doi]
- Detection Of Intrusion Attacks Using Neural NetworksMikolaj P. Karpinski, Alexander Shmatko, Serhii Yevseiev, Daniel Jancarczyk, Stanislav Milevskyi. 107-114 [doi]
- Technology of Secure Data Exchange in the IoT SystemHassan Mohamed Muhi-Aldeen, Yurii Khlaponin, Ibtehal Shakir Mahmoud, Volodymyr Vyshniakov, Vadym Poltorak, Dmytro Khlaponin, Muwafaq Shyaa Alwan. 115-121 [doi]
- Critical Points of Information Influence in Social NetworksOleksandr Milov, Serhii Yevseiev, Stanislav Milevskyi, Krzysztof Kajstura, Ruslana Ziubina. 122-127 [doi]
- Application Of Greedy Algorithms On Classes (ψ, β) - differentiable Periodic Functions In Lebesgue Spaces For Optimization ProblemsIryna Zamrii, Viktoriya Shkapa, Valentyn Sobchuk, Hanna Vlasyk. 128-134 [doi]
- Evaluation of Cryptographic Strength and Energy Intensity of Design of Modified Crypto-Code Structure of McEliece with Modified Elliptic CodesSerhii Yevseiev, Olha Korol, Olga Veselska, Serhii Pohasii, Vladyslav Khvostenko. 135-148 [doi]
- Determining the Level of Flight Crew Readiness Based on Fuzzy Logic ApproachesOleksandr Blyskun, Volodymyr Herasymenko, Oleksii Martyniuk, Yurii Kolomiiets, Yevhen Honcharenko. 149-157 [doi]
- Methods of quality assurance of software development based on a systems approachIryna Ushakova, Yuri Skorin, Alexander V. Shcherbakov. 158-168 [doi]
- Cyber Defense Is A Modern Component Of Ukraine's SecurityOleksandr Lavrut, Tetiana Lavrut, Vladyslav Kolesnyk, Halyna Kolesnyk, Serhii Bohutskyi, Leonid Polishchuk. 169-174 [doi]
- Audit Of Mathematical Models For Software Specification Of The Workplace Decision Support System At The Logistics Management PointRoman Litvinchuk, Andrii Levchenko. 175-182 [doi]
- Use of the Normalized Gap of Maximum Singular Value of the Image Block to Evaluate the Capacity of the Steganographic ChannelIvan Bobok, Alla Kobozieva, Nataliya Kushnirenko. 183-188 [doi]
- Information Technology for Identification of Electric Stimulating Effects ParametersVolodymyr Fedorchenko, Igor Prasol, Olha Yeroshenko. 189-195 [doi]
- Identifying the Transition of Interactions in Virtual Communities of Social Networking Services to Chaotic DynamicsKateryna Molodetska, Serhiy Veretiuk, Volodymyr Pilinsky. 196-203 [doi]
- Cyber Terrorism as an Object of ModelingOleksandr Milov, Yevgen Melenti, Stanislav Milevskyi, Serhii Pohasii, Serhii Yevseiev. 204-210 [doi]
- Methodology For Environmental Monitoring With Use of Methods of Mathematical ModelingNadiia Bielikova, Daniil Shmatkov. 211-217 [doi]
- Spectral Model of the Encryption Key for a Symmetric Cryptosystem Based on Differential TransformationsOlha Hryshchuk. 218-222 [doi]
- Example of Differential Transformations Application in CybersecurityRuslan Hryshchuk. 223-227 [doi]
- Possibilities of Using Watermarks to Protect Software CodeVadym Poddubnyi, Roman Gvozdev, Oleksandr Sievierinov, Oleksandr Fediushyn. 228-233 [doi]
- Simulation model of Blockchain System in the Higher EducationShmatko Olexandr, Serhii Yevseiev, Vladyslav Khvostenko. 234-238 [doi]
- Errors in the Hardware of the Device Used to Measure the Average Voltage of Infrared FrequenciesAynur Jamal Jabiyeva. 239-243 [doi]
- Paradigm of Safe Intelligent Ecological Monitoring of Environmental ParametersYuriy Bobalo, Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk. 244-249 [doi]
- Legal Aspects of Blockchain Technology Regulation in the Financial SphereKateryna Tokarieva, Nataliya Vnukova, Volodymyr Aleksiyev. 250-254 [doi]
- Improving the Stability of Cryptographic Algorithms on Algebraic LatticesOlha Petrenko, Oleksii Petrenko. 255-259 [doi]
- A Mobile Augmented Reality Application for Museum ExhibitionsAnastasiya Molchanova, Svitlana Kuznichenko, Iryna Buchynska. 260-264 [doi]
- The Mersenne Twister Output Stream PostprocessingYurii Shcherbyna, Nadiia Kazakova, Oleksii Fraze-Frazenko. 265-273 [doi]
- Model and Method for Identification of Functional Security ProfileAnatolii Davydenko, Oleksandr Korchenko, Olena Vysotska, Ihor Ivanchenko. 274-280 [doi]
- Information Support for Making Strategic Decisions on the Development of an Industrial EnterpriseIryna Otenko, Marharyta Podorozhna, Vasyl Otenko. 281-285 [doi]
- Development of an Automated Passenger Transport Management System Using Microservices ArchitectureMykyta Dermenzhi, Svitlana Kuznichenko, Tetiana Tereshchenko, Iryna Buchynska, Viktoriia Klepatska. 286-294 [doi]
- Real-Time Cybersecurity Risk AssessmentOleksandr Korchenko, Svitlana Kazmirchuk, Tetiana Panivko-Babenko, Stanislav Milevskyi, Volodymyr Aleksiyev. 295-309 [doi]