Collection's Items (Sorted by Submit Date in Descending order): 1 to 15 of 15
Issue Date | Title | Author(s) |
2019 | OSINT as a part of cyber defense system | Lande, Dmytro V.; Shnurko-Tabakova, Ellina V. |
2019 | Comparative Analysis of the Cybersecurity Indices and Their Applications | Kravets, V. M. |
2019 | Methodical and Applied Aspects of Creation and Application of Cyber Ranges | Danyk, Yuriy |
2019 | «Reactional» information operations in cyberspace | Mishyn, V. M. |
2019 | Malicious Information Source Detection in Social Networks | Melnyk, V. V.; Styopochkina, I. V. |
2019 | Deep learning based automatic software defects detection Framework | Chernousov, A.; Savchenko, A.; Osadchyi, S.; Kubiuk, Y.; Kostenko, Y.; Likhomanov, D. |
2019 | Extended Vulnerability Feature Extraction Based on Public Resources | Tatarinova, Y. Y.; Sinelnikova, O. I. |
2019 | National Security Assessment Method Based on Fuzzy Sets Theory | Kachynskyi, A. B. |
2019 | Fuzzy ontology structure for information leaks and ISC | Kozlenko, Oleh |
2019 | Mathematical models of information concealment cases spreading dynamics in social media | Nakonechna, Y. V. |
2019 | Asymptotic Distributions for S-Box Heterogeneous Differential Probabilities | Yakovliev, S. V.; Bakhtigozin, V. Yu. |
2019 | The necessary security requirements for the values used by the AJPS cryptosystem | Fesenko, A.; Yadukha, D. |
2019 | On desynchronised multivariate algorithms of El Gamal type for stable semigroups of affine Cremona group | Ustimenko, Vasyl |
2019 | Number of Confirmation Blocks for Bitcoin and GHOST Consensus Protocols on Networks with Delayed Message Delivery | Kovalchuk, L. V.; Kaidalov, D. S.; Nastenko, A. O.; Shevtsov, O. V.; Rodinko, M. Yu.; Oliynykov, R. V. |
2019 | Parameters of the Fastest Cryptographically Strong Twisted Edwards Curves | Bessalov, A.; Dykyi, V.; Malyshko, A.; Tsygankova, O.; Yadukha, D. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 15 of 15