Collection's Items (Sorted by Submit Date in Descending order): 1 to 13 of 13
Issue Date | Title | Author(s) |
2020 | Features of Ensuring Cybersecurity of the Critical Infrastructure of the State | Danyk, Yuriy; Briggs, Chad; Maliarchuk, Tamara |
2020 | Wavelet and fractal analysis based news spreading model | Smetanyuk, B. L.; Mishyn, V. V.; Nakonechna, Y. V. |
2020 | Methods and Techniques of Assessment of the Value Orientations of Social Media Users | Kiforchuk, K. O. |
2020 | Machine learning based network traffic classification approach for Internet of Things devices | Melnik, Vadym; Haleta, Pavlo; Golphamid, Nazar |
2020 | DeeDP: vulnerability detection and patching based on deep learning | Savchenko, A.; Fokin, O.; Chernousov, A.; Sinelnikova, O.; Osadchyi, S. |
2020 | Detection and correction of database schema integrity violation based on initialization scripts | Kondratiuk, O.; Kolomitsev, M. |
2020 | Mobile driving license system deployment model with security enhancement | Blynkov, V.; Yaremenko, V. |
2020 | On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms | Ustimenko, Vasyl |
2020 | Malicious and benign websites classification using machine learning methods | Lavreniuk, M.; Novikov, O. |
2020 | Comparison of Efficiency of Statistical Models Used for Formation of Feature Vectors by JPEG Images Steganalysis | Koshkina, Nataliya |
2020 | Reinforced machine learning methods for testing quality of cyber threat prediction results | Kachynskyi, A. B.; Tsebrinska, N. A. |
2020 | Algebraic immunity of vectorial Boolean functions and Boolean Groebner bases | Alekseychuk, A. N. |
2020 | Aspects of blockchain reliability considering its consensus algorithms | Gorniak, K. S.; Kudin, A. M. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 13 of 13