Abstract is missing.
- Modeling the Survivability of Network StructuresAleksandr G. Dodonov, Dmytro V. Lande. 1-10 [doi]
- Ensuring Secure Long-term Data StorageViacheslav Petrov, Andriy Kryuchyn, Ievgen Beliak, Olexiy Shihovets. 11-23 [doi]
- Method for Identifying Twitter Accounts that Have Changed their Opinion about PoliticiansTaras Rudnyk, Oleg Chertov. 24-35 [doi]
- Decentralization of the Issue-based Knowledge Transfer PlatformVitaliy V. Tsyganok, Mykyta Savchenko, Sergii V. Kadenko, Oleh V. Andriichuk. 36-45 [doi]
- Application of Expert Decision-making Technologies for Fair Evaluation in Testing ProblemsHryhorii Hnatiienko, Vitaliy Snytyuk, Nataliia Tmienova, Oleksii Voloshyn. 46-60 [doi]
- Analysis of Cyber Exercises ApproachesVolodymyr Mokhor, Vasyl Tsurkan, Valeriia Pokrovska. 61-70 [doi]
- Coding for Information Systems Security and ViabilityBohdan Zhurakovskyi, Serhii Toliupa, Serhiy Otrokh, Valeriy Kuzminykh, Hanna Dudarieva, Vladislav Zhurakovskyi. 71-84 [doi]
- Adaptive Approach to Building Risk Models of Financial SystemsNataliia Kuznietsova, Petro Bidyuk. 85-98 [doi]
- Visualization of Pursuit Differential Game on a PlaneLesia Baranovska, Dmytro Hyriavets, Kateryna Dovzhanytsia, Vadym Mukhin. 99-113 [doi]
- Semantic Processing of Metadata for Big Data: Standards, Ontologies and Typical Information ObjectsJulia V. Rogushina, Anatoly Y. Gladun. 114-128 [doi]
- Dynamic Reconfiguration in Automated Organizational Management SystemsAleksandr G. Dodonov, Olena Gorbachyk, Maryna Kuznietsova. 129-141 [doi]
- An Overview of Decision Support Software: Strategic Planning PerspectiveSergii V. Kadenko, Vitaliy V. Tsyganok, Oleh V. Andriichuk, Aleksandr Karabchuk, Minglei Fu. 142-156 [doi]
- General Case of Wavelet Transform with Reducible Rational Dilation FactorOleg Chertov, Volodymyr Malchykov. 157-167 [doi]
- Methodology for Extracting of Key Words and Phrases and Building Directed Weighted Networks of Terms with Using Part-of-speech TaggingDmytro V. Lande, Oleh O. Dmytrenko. 168-177 [doi]
- Structural Constructions of Computer Engineering Elements in K-valued LogicVolodymyr Yartsev, Dmitry Gololobov. 178-187 [doi]
- Modeling of Information Security System and Automated Assessment of the Integrated Quality of the Impact of Controls on the Functional Stability of the Organizational SystemTetiana Babenko, Hryhorii Hnatiienko, Vira Vialkova. 188-198 [doi]
- Empirical Study of New Metrics for the Internet Route Hijack Risk AssessmentVitalii Zubok, Igor Kotsiuba. 199-209 [doi]
- Rule-oriented Method of Cyber Incidents Detection by SIEM Based on Fuzzy Logical InferenceIhor Subach, Volodymyr Kubrak, Artem Mykytiuk, Stanislav Korotayev. 210-219 [doi]
- Adaptive Management of the Order in Which Resources are Provided to Cloud UsersAleksandr Matov. 220-234 [doi]
- OpenEMR Based Model of a Organizational Management System for a Medical InstitutionSergiy Zagorodnyuk, Bohdan Sus, Oleksandr Bauzha. 235-245 [doi]