Skip navigation

Theoretical and Applied Cybersecurity: scientific journal, Vol. 2, No. 1 : [13] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 13 of 13
Issue DateTitleAuthor(s)
2020Features of Ensuring Cybersecurity of the Critical Infrastructure of the StateDanyk, Yuriy; Briggs, Chad; Maliarchuk, Tamara
2020Wavelet and fractal analysis based news spreading modelSmetanyuk, B. L.; Mishyn, V. V.; Nakonechna, Y. V.
2020Methods and Techniques of Assessment of the Value Orientations of Social Media UsersKiforchuk, K. O.
2020Machine learning based network traffic classification approach for Internet of Things devicesMelnik, Vadym; Haleta, Pavlo; Golphamid, Nazar
2020DeeDP: vulnerability detection and patching based on deep learningSavchenko, A.; Fokin, O.; Chernousov, A.; Sinelnikova, O.; Osadchyi, S.
2020Detection and correction of database schema integrity violation based on initialization scriptsKondratiuk, O.; Kolomitsev, M.
2020Mobile driving license system deployment model with security enhancementBlynkov, V.; Yaremenko, V.
2020On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophismsUstimenko, Vasyl
2020Malicious and benign websites classification using machine learning methodsLavreniuk, M.; Novikov, O.
2020Comparison of Efficiency of Statistical Models Used for Formation of Feature Vectors by JPEG Images SteganalysisKoshkina, Nataliya
2020Reinforced machine learning methods for testing quality of cyber threat prediction resultsKachynskyi, A. B.; Tsebrinska, N. A.
2020Algebraic immunity of vectorial Boolean functions and Boolean Groebner basesAlekseychuk, A. N.
2020Aspects of blockchain reliability considering its consensus algorithmsGorniak, K. S.; Kudin, A. M.
Collection's Items (Sorted by Submit Date in Descending order): 1 to 13 of 13