Works matching IS 22255036 AND DT 2014 AND VI 20 AND IP 2
1
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 197, doi. 10.18372/2225-5036.20.7308
- Korchenko, O.;
- Gornitska, D.;
- Gololobov, A.
- Article
2
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 193, doi. 10.18372/2225-5036.20.7307
- Kinzeryavyy, V.;
- Gnatyuk, V.
- Article
3
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 185, doi. 10.18372/2225-5036.20.7306
- Article
4
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 176, doi. 10.18372/2225-5036.20.7305
- Article
5
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 169, doi. 10.18372/2225-5036.20.7304
- Kukharska, N.;
- Kukharskyy, V.
- Article
6
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 164, doi. 10.18372/2225-5036.20.7303
- Article
7
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 159, doi. 10.18372/2225-5036.20.7302
- Luzhetskiy, V.;
- Gorbenko, I.
- Article
8
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 153, doi. 10.18372/2225-5036.20.7301
- Article
9
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 148, doi. 10.18372/2225-5036.20.7300
- Article
10
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 143, doi. 10.18372/2225-5036.20.7299
- Babenko, V.;
- Melnyk, O.;
- Stabetska, T.
- Article
11
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 132, doi. 10.18372/2225-5036.20.7298
- Maksymenko, E.;
- Zhylin, A.
- Article
12
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 126, doi. 10.18372/2225-5036.20.7297
- Article
13
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 120, doi. 10.18372/2225-5036.20.7296
- Rajba, Stanislaw;
- Karpinski, Mikolaj;
- Korchenko, Oleksandr
- Article
14
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 113, doi. 10.18372/2225-5036.20.7295
- Article