- 1. The role of innovative technologies in ensuring the competitiveness of the enterprise
- (Content №5 2022)
- ... Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms. Journal of Information Security, 9, 133-153. https://doi.org/10.4236/jis.2018.92010. 18. Yevseiev, S., Shmatko, O., & ...
- Created on 30 October 2022
- 2. Protection of information resources as an integral part of economic security of the enterprise
- (Content №4 2022)
- ... model and optimization algorithms are proposed for using an improved methodological approach to the formation of information security of the enterprise in terms of minimizing costs and losses. This allows ...
- Created on 29 August 2022
- 3. Main mechanisms of blockchain technology implementation in digital technologies application
- (Content №3 2022)
- ... Distributed Ledger Technology & Cybersecurity Improving information security in the financial sector. ENISA (European Network and Information Security Agency). Retrieved from http://www.the-blockchain.com/docs/European%20Union%20Agency%20for%20Network%20and%20Information%20Security%20-%20Distributed%20Ledger%20Technology%20And%20Cybersecurity.pdf. ...
- Created on 29 June 2022
- 4. Non-relational approach to developing knowledge bases of expert system prototype
- (Content №2 2022)
- Authors: V.V.Hnatushenko, orcid.org/0000-0003-3140-3788, Dnipro University of Technology, Dnipro, Ukraine, email: This email address is being protected from spambots. You need JavaScript enabled to view it. Vik.V.Hnatushenko, orcid.org/0000-0001-5304-4144, Ukrainian State University ...
- Created on 30 April 2022
- 5. Analysis of attacks in IEEE 802.11 networks at different levels of OSI model
- (Content №2 2021)
- ... of the SYN Flood DoS Attack.International Journal of Computer Network and Information Security, 5(8), 15-11. https://doi.org/10.5815/ijcnis.2013.08.01. 20. Kolias, C., Kambourakis, G., Stavrou, A., & ...
- Created on 29 April 2021
- 6. EUROSAI ITWG model adoption for new IT audit framework: e-government cases
- (Information Technologies, Systems Analysis and Administration)
- ... techniques ‒ Code of practice for information security controls [online]. Available at: <https://www.iso.org/standard/ 54533.html> [Accessed 21 February 2018]. 17. EUROSAI IT working group, ...
- Created on 16 May 2018
- 7. Safe information environment as a quality indicator of educational institution management
- (Economy and management)
- ... in higher professional institutions. The course “Information security of educational institution” is developed. It aims at professional development in the field of information security of employees in ...
- Created on 06 September 2017
- 8. Systematic approach to the organization of safe information and education environment in the higher educational institutions
- (Economy and management)
- ... and personal information security of all the participants of the educational process in order to create adequate development conditions for the realization of their individual abilities and possibilities. ...
- Created on 02 October 2016
- 9. Enchantment of the information component of innovation development of industry
- (Economy and management)
- ... of which requires enhancement of an information security mechanism for innovation processes, the application of which contributes to the development of intellectual capital of enterprises, improvement ...
- Created on 23 June 2016
- 10. Complex estimation, identification and prediction of difficult nonlinear processes
- (Information technologies, systems analysis and administration)
- Authors: V.I. Korniienko, Dr. Sci. (Tech.), Professor, State Higher Educational Institution “National Mining University”, Senior Lecturer of the Department of Information Security and Telecommunications, ...
- Created on 24 December 2013
- 11. Research of network traffic entropy as a DDOS-attack indicator
- (Information technologies, systems analysis and administration)
- Authors: Т.V. Babenko, Dr. Sci. (Tech.), Professor, State Higher Educational Institution “National Mining University”, Head of the Department of Information Security and Telecommunications, Head of Information ...
- Created on 16 April 2013
- 12. System analysis of the information exchange during emergencies in mines
- (Environmental safety, labour protection)
- ... of information within the systems, the psycho-physical factors, partial decoding of information, change of information during its assimilation in the source and receptor systems, information security, ...
- Created on 19 December 2012
- 13. Sea coastal waters monitoring geoinformation system
- (To the 15th anniversary of Geoinformatic Systems Department)
- ... of Nuclear Energy and Industry, Sevastopol, Ukraine Yu.Yu. Goncharenko, Candidate of Sciences (Tech.), Senior Lecturer of Information Security Department Sevastopol National University of Nuclear ...
- Created on 23 November 2012
- 14. Information security problems of educational electronic information resources
- (Information technologies, systems analysis and administration)
- ... Electronic Database on Education (USEDE). Methodology. For the information security risk analysis within the investigated system we have used qualitative methods, which allowed us to rank probable incidents ...
- Created on 08 November 2012