Abstract is missing.
- Survivability of Organizational Management Systems and the Maintenance of Critical Infrastructure SecurityAleksandr G. Dodonov, Olena Gorbachyk, Maryna Kuznietsova. 1-10 [doi]
- Methodology of Rational Choice of Security Incident Management System for Building Operational Security CenterIgor Subach, Volodymyr Kubrak, Artem Mykytiuk. 11-20 [doi]
- Ontology-Based Approach to Validation of Learning Outcomes for Information Security DomainJulia V. Rogushina, Anatoly Y. Gladun, Serhii M. Pryima, Oksana V. Strokan. 21-36 [doi]
- Standard Analytic Activity Scenarios Optimization based on Subject Area AnalysisOleksandr Koval, Valeriy Kuzminykh, Maksym Voronko. 37-46 [doi]
- Survival analysis methods for churn prevention in telecommunications industryMariia Havrylovych, Nataliia Kuznietsova. 47-58 [doi]
- Protection of data transmission systems from the influence of intersymbol interference of signalsVolodymyr Yartsev, Dmitry Gololobov. 59-70 [doi]
- Implementation of combined method in constructing a trajectory for structure reconfiguration of a computer system with reconstructible structure and programmable logicVolodymyr Tokariev, Vitalii Tkachov, Iryna Ilina, Stanislav Partyka. 71-81 [doi]
- A posteriori determination of expert competence under uncertaintyHryhorii Hnatiienko, Vitaliy Snytyuk. 82-99 [doi]
- Modeling Complexes of Organizational Management Automated Systems - a Means to Overcome the Management CrisisAleksandr Dodonov, Aleksey Nikiforov, Vladimir Putyatin, Vadim Dodonov. 100-115 [doi]
- Comparing Efficiency of Expert Data Aggregation MethodsSergii V. Kadenko, Vitaliy V. Tsyganok, Aleksandr Karabchuk. 116-131 [doi]
- Determining the Directions of Links in Undirected Networks of TermsDmytro V. Lande, Oleh O. Dmytrenko, Oksana Radziievska. 132-145 [doi]
- Rational Wavelet Transform with Reducible Rational Dilation FactorOleg Chertov, Volodymyr Malchykov. 146-158 [doi]
- Probabilistic criterion of information security management system developmentVolodymyr Mokhor, Oleksandr Bakalynskyi, Vasyl Tsurkan. 159-168 [doi]
- An Approach to Transaction Delegation in Self-protected Decentralized Data PlatformsMykyta Savchenko, Vitaliy V. Tsyganok, Oleh V. Andriichuk. 169-188 [doi]
- Modified Exponential Smoothing Method to Improve Course Estimation of a Moving ObjectVolodymyr Yuzefovych, Yevheniia Tsybulska. 189-198 [doi]
- System of Intellectual Ukrainian Language ProcessingNataliia Tmienova, Bogdan Sus. 199-209 [doi]
- Adaptation of cloud computing as optimization of the process of rendering services to users in the conditions of limited computing resourcesAleksandr Matov. 210-221 [doi]
- Defining Potential Academic Expert Groups based on Joint Authorship Networks Using Decision Support ToolsIryna V. Balagura, Sergii V. Kadenko, Oleh V. Andriichuk, Ivan V. Gorbov. 222-233 [doi]
- Choice Manipulation in Multicriteria Optimization ProblemsHryhorii Hnatiienko. 234-245 [doi]
- Use of Semantic Similarity Estimates for Unstructured Data AnalysisJulia V. Rogushina. 246-258 [doi]
- Method of formation shift indexes vector by minimization of polynomialsLiubov Berkman, Serhiy Otrokh, Valeriy Kuzminykh, Olena Hryshchenko. 259-269 [doi]
- Analysis of testing approaches to Android mobile application vulnerabilitiesMykhailo Antonishyn, Oleksii Misnik. 270-280 [doi]
- Mathematical Model of Threats Resistance in the Critical Information Resources Protection SystemBogdan Korniyenko, Liliya Galata, Lesya Ladieva. 281-291 [doi]
- Building Formal Model of the Internet Routing for Risk Evaluation of Cyberattacks on Global RoutingVitalii Zubok. 292-301 [doi]