Found: 15
Select item for more details and to access through your institution.
Definition source of error prediction for unauthorized access to information networks of the state.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 7, doi. 10.18372/2225-5036.22.10447
- By:
- Publication type:
- Article
Vulnerability investigation for Internet of things sensor subnetworks architecture for different types of attacks.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 12, doi. 10.18372/2225-5036.22.10448
- By:
- Publication type:
- Article
Ukrainian national grid structure from viewpoint of security requirements ensuring in the grid environment.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 20, doi. 10.18372/2225-5036.22.10449
- By:
- Publication type:
- Article
Simulation of hacking and operation condition analysis for technical information security.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 26, doi. 10.18372/2225-5036.22.10450
- By:
- Publication type:
- Article
Modern obfuscation methods for secure coding.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 32, doi. 10.18372/2225-5036.22.10451
- By:
- Publication type:
- Article
Structure analysis of secured applications programming language for programmable logic controllers.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 38, doi. 10.18372/2225-5036.22.10452
- By:
- Publication type:
- Article
Increase the cybersecurity of transport information and communications systems.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 44, doi. 10.18372/2225-5036.22.10453
- By:
- Publication type:
- Article
Modern critical aviation information systems.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 51, doi. 10.18372/2225-5036.22.10454
- By:
- Publication type:
- Article
Quantum secret sharing protocol with communication channel checking.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 58, doi. 10.18372/2225-5036.22.10455
- By:
- Publication type:
- Article
THE SYNERGETIC APPROACH FOR PROVIDING BANK INFORMATION SECURITY: THE PROBLEM FORMULATION.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 64, doi. 10.18372/2225-5036.22.10456
- By:
- Publication type:
- Article
General solving linear Diophantine equations based on a modular transformation for risk assessment in information security.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 75, doi. 10.18372/2225-5036.22.10457
- By:
- Publication type:
- Article
Definition of security indicator for the virtual community against information attacks.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 84, doi. 10.18372/2225-5036.22.10458
- By:
- Publication type:
- Article
Technology of the informational war: the concept of meme-programming.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 88, doi. 10.18372/2225-5036.22.10459
- By:
- Publication type:
- Article
Methodology of complex security for the person and social groups against the negative information-psychological influence.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 94, doi. 10.18372/2225-5036.22.10460
- By:
- Publication type:
- Article
Analysis of «crisis» definition and basic aspects of business continuing planning concept.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2016, v. 22, n. 1, p. 99, doi. 10.18372/2225-5036.22.10461
- By:
- Publication type:
- Article