- 1. Intelligent Sentinel satellite image processing technology for land cover mapping
- (Content №5 2024)
- ... Systems of Information Security (IntelITSIS-2020), Khmelnytskyi, Ukraine June 10-12, 2020. 12. Massout, S., & Smara, Y. (2021). Panchromatic and multispectral image fusion using the spatial frequency ...
- Created on 29 October 2024
- 2. Cyber risk management technology to strengthen the information security of the national economy
- (Content №5 2024)
- ... cyber risk management technology is one of the tools for preventing the realization of risks in cyberspace and the basis for strengthening the information security of economic entities in particular and ...
- Created on 29 October 2024
- 3. Data flow management in information systems using blockchain technology
- (Content №3 2024)
- ... Information Technologies & Systems of Information Security, March 23–25, 2022. Khmelnytskyi, Ukraine, 3156, 587-598. Retrieved from https://ceur-ws.org/Vol-3156/paper45.pdf. 9. Tian, F. (2016). An ...
- Created on 28 June 2024
- 4. Organizational and legal principles of information security of enterprises in the conditions of martial law in Ukraine
- (Content №1 2024)
- ... 2024, (1): 167 - 174 https://doi.org/10.33271/nvngu/2024-1/167 Abstract: Purpose. To investigate the peculiarities of organizational and legal provision of information security (IS) in the conditions ...
- Created on 29 February 2024
- 5. Modeling arithmetic systems of elliptic curve cryptography using Microsoft Excel VBA
- (Content №1 2024)
- ... Abstract: Purpose. This study aims to develop a new teaching module to illustrate the arithmetic systems of Elliptic Curve Cryptography, a powerful yet simple algorithm for information security, by exploring ...
- Created on 29 February 2024
- 6. Digital economy: opportunities for transformation of entepreneurial structures
- (Content №1 2024)
- ... T., & Lernyk, S. (2022). The legal mechanisms for information security in the context of digitalization. Journal of Information Technology Management, 14, 25-58. https://doi.org/10.22059/jitm.2022.88868. ...
- Created on 29 February 2024
- 7. Development of digital infrastructure and blockchain in Ukraine
- (Content №6 2023)
- ... S., Makeieva, O., Usachenko, O., Veklych, V., Arifkhodzhaieva, T., & Lernyk, S. (2022). The legal mechanisms for information security in the context of digitalization. Journal of Information Technology ...
- Created on 23 December 2023
- 8. Critical infrastructure defense: perspectives from the EU and USA cyber experts
- (Content №5 2023)
- ... successfully deploying Cyber Autonomy. Originality. The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information ...
- Created on 27 October 2023
- 9. The role of innovative technologies in ensuring the competitiveness of the enterprise
- (Content №5 2022)
- ... Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms. Journal of Information Security, 9, 133-153. https://doi.org/10.4236/jis.2018.92010. 18. Yevseiev, S., Shmatko, O., & ...
- Created on 30 October 2022
- 10. Protection of information resources as an integral part of economic security of the enterprise
- (Content №4 2022)
- ... model and optimization algorithms are proposed for using an improved methodological approach to the formation of information security of the enterprise in terms of minimizing costs and losses. This allows ...
- Created on 29 August 2022
- 11. Main mechanisms of blockchain technology implementation in digital technologies application
- (Content №3 2022)
- ... Distributed Ledger Technology & Cybersecurity Improving information security in the financial sector. ENISA (European Network and Information Security Agency). Retrieved from http://www.the-blockchain.com/docs/European%20Union%20Agency%20for%20Network%20and%20Information%20Security%20-%20Distributed%20Ledger%20Technology%20And%20Cybersecurity.pdf. ...
- Created on 29 June 2022
- 12. Non-relational approach to developing knowledge bases of expert system prototype
- (Content №2 2022)
- Authors: V.V.Hnatushenko, orcid.org/0000-0003-3140-3788, Dnipro University of Technology, Dnipro, Ukraine, email: This email address is being protected from spambots. You need JavaScript enabled to view it. Vik.V.Hnatushenko, orcid.org/0000-0001-5304-4144, Ukrainian State University ...
- Created on 30 April 2022
- 13. Analysis of attacks in IEEE 802.11 networks at different levels of OSI model
- (Content №2 2021)
- ... of the SYN Flood DoS Attack.International Journal of Computer Network and Information Security, 5(8), 15-11. https://doi.org/10.5815/ijcnis.2013.08.01. 20. Kolias, C., Kambourakis, G., Stavrou, A., & ...
- Created on 29 April 2021
- 14. EUROSAI ITWG model adoption for new IT audit framework: e-government cases
- (Information Technologies, Systems Analysis and Administration)
- ... techniques ‒ Code of practice for information security controls [online]. Available at: <https://www.iso.org/standard/ 54533.html> [Accessed 21 February 2018]. 17. EUROSAI IT working group, ...
- Created on 16 May 2018
- 15. Safe information environment as a quality indicator of educational institution management
- (Economy and management)
- ... in higher professional institutions. The course “Information security of educational institution” is developed. It aims at professional development in the field of information security of employees in ...
- Created on 06 September 2017
- 16. Systematic approach to the organization of safe information and education environment in the higher educational institutions
- (Economy and management)
- ... and personal information security of all the participants of the educational process in order to create adequate development conditions for the realization of their individual abilities and possibilities. ...
- Created on 02 October 2016
- 17. Enchantment of the information component of innovation development of industry
- (Economy and management)
- ... of which requires enhancement of an information security mechanism for innovation processes, the application of which contributes to the development of intellectual capital of enterprises, improvement ...
- Created on 23 June 2016
- 18. Complex estimation, identification and prediction of difficult nonlinear processes
- (Information technologies, systems analysis and administration)
- Authors: V.I. Korniienko, Dr. Sci. (Tech.), Professor, State Higher Educational Institution “National Mining University”, Senior Lecturer of the Department of Information Security and Telecommunications, ...
- Created on 24 December 2013
- 19. Research of network traffic entropy as a DDOS-attack indicator
- (Information technologies, systems analysis and administration)
- Authors: Т.V. Babenko, Dr. Sci. (Tech.), Professor, State Higher Educational Institution “National Mining University”, Head of the Department of Information Security and Telecommunications, Head of Information ...
- Created on 16 April 2013
- 20. System analysis of the information exchange during emergencies in mines
- (Environmental safety, labour protection)
- ... of information within the systems, the psycho-physical factors, partial decoding of information, change of information during its assimilation in the source and receptor systems, information security, ...
- Created on 19 December 2012