- 1. Imperatives of information protection in the structure of economic security of an enterprise
- (Content №6 2025)
- ... of the integral indicator of information security has been formed. Based on the optimization of the values of local cyber immunities, its corresponding cost has been minimized. Practical value. The practice ...
- Created on 25 December 2025
- 2. Simulation-driven assessment of cryptographic algorithms for resource-constrained infocommunication networks
- (Content №6 2025)
- ... as well as its potential for improving information security protocols and selecting optimal algorithms based on processing speed requirements and desired security levels. Keywords: cryptographic algorithm, ...
- Created on 25 December 2025
- 3. Legal aspects of information security in Ukraine in the conditions of European integration and war
- (Content №5 2025)
- ... 132 - 141 https://doi.org/10.33271/nvngu/2025-5/132 Abstract: Purpose. To propose improvements in legal norms in the field of information security (IS). To substantiate the need to improve the legal ...
- Created on 25 October 2025
- 4. Quantum machine learning for fusion of multichannel optical satellite images
- (Content №5 2025)
- ... A Wavelet and HSV Pansharpening Technology of High Resolution Satellite Images. Intelligent Information Technologies & Systems of Information Security Intel, 2020, 67-76. Retrieved from https://ceur-ws.org/Vol-2623/paper7.pdf ...
- Created on 25 October 2025
- 5. Paradigms of modeling and improving the reliability of data transmission in VLC technologies
- (Content №4 2025)
- ... modes and channel condition monitoring. The results are relevant for reliable wireless networks in conditions of increased requirements to information security and for critical facilities. Keywords: ...
- Created on 26 August 2025
- 6. Development of a clustering algorithm for parameters of explosive objects based on a comprehensive indicator
- (Content №4 2025)
- ... S., Yanko, A., & Sivitska, S. (2023). Business Information Security. In V. Onyshchenko, G. Mammadova, S. Sivitska, & A. Gasimov (Eds.). Proceedings of the 4 th International Conference on Building ...
- Created on 26 August 2025
- 7. FoSDeT: a new hybrid machine learning model for accurate and fast detection of IoT botnet
- (Content №1 2025)
- ... features. International Journal of Communication Networks and Information Security, 10(3), 563. 16. Hoang, X. D., & Nguyen, Q. C. (2018). Botnet detection based on machine learning techniques using ...
- Created on 25 February 2025
- 8. Technology for determining weight coefficients of components of information security
- (Content №1 2025)
- ... Abstract: Purpose. Development of a technology for determining weighting coefficients based on an improved methodology to ensure the accuracy of determining the level of information security, taking ...
- Created on 25 February 2025
- 9. Enhancing the protection of automated ground robotic platforms in the conditions of radio electronic warfare
- (Content №6 2024)
- ... the International Conference on Information Security Technologies in the Decentralized Distributed Networks. Lecture Notes on Data Engineering and Communications Technologies, 115, 263-286. Springer, Cham. ...
- Created on 28 December 2024
- 10. Analysis of the strength of the composite module of the body wagon-coal truck
- (Content №6 2024)
- ... 12(1). https://doi.org/10.7225/toms.v12.n01.002. 6. Melnyk, O., Onyshchenko, S., Onishchenko, O., Shumylo, O., Voloshyn, A., Koskina, Y., & Volianska, Y. (2022). Review of Ship Information Security ...
- Created on 28 December 2024
- 11. Intelligent Sentinel satellite image processing technology for land cover mapping
- (Content №5 2024)
- ... Systems of Information Security (IntelITSIS-2020), Khmelnytskyi, Ukraine June 10-12, 2020. 12. Massout, S., & Smara, Y. (2021). Panchromatic and multispectral image fusion using the spatial frequency ...
- Created on 29 October 2024
- 12. Cyber risk management technology to strengthen the information security of the national economy
- (Content №5 2024)
- ... cyber risk management technology is one of the tools for preventing the realization of risks in cyberspace and the basis for strengthening the information security of economic entities in particular and ...
- Created on 29 October 2024
- 13. Data flow management in information systems using blockchain technology
- (Content №3 2024)
- ... Information Technologies & Systems of Information Security, March 23–25, 2022. Khmelnytskyi, Ukraine, 3156, 587-598. Retrieved from https://ceur-ws.org/Vol-3156/paper45.pdf. 9. Tian, F. (2016). An ...
- Created on 28 June 2024
- 14. Organizational and legal principles of information security of enterprises in the conditions of martial law in Ukraine
- (Content №1 2024)
- ... 2024, (1): 167 - 174 https://doi.org/10.33271/nvngu/2024-1/167 Abstract: Purpose. To investigate the peculiarities of organizational and legal provision of information security (IS) in the conditions ...
- Created on 29 February 2024
- 15. Modeling arithmetic systems of elliptic curve cryptography using Microsoft Excel VBA
- (Content №1 2024)
- ... Abstract: Purpose. This study aims to develop a new teaching module to illustrate the arithmetic systems of Elliptic Curve Cryptography, a powerful yet simple algorithm for information security, by exploring ...
- Created on 29 February 2024
- 16. Digital economy: opportunities for transformation of entepreneurial structures
- (Content №1 2024)
- ... T., & Lernyk, S. (2022). The legal mechanisms for information security in the context of digitalization. Journal of Information Technology Management, 14, 25-58. https://doi.org/10.22059/jitm.2022.88868. ...
- Created on 29 February 2024
- 17. Development of digital infrastructure and blockchain in Ukraine
- (Content №6 2023)
- ... S., Makeieva, O., Usachenko, O., Veklych, V., Arifkhodzhaieva, T., & Lernyk, S. (2022). The legal mechanisms for information security in the context of digitalization. Journal of Information Technology ...
- Created on 23 December 2023
- 18. Critical infrastructure defense: perspectives from the EU and USA cyber experts
- (Content №5 2023)
- ... successfully deploying Cyber Autonomy. Originality. The research demonstrates the interdisciplinary nature of cybersecurity and applies a comprehensive approach covering information security, information ...
- Created on 27 October 2023
- 19. The role of innovative technologies in ensuring the competitiveness of the enterprise
- (Content №5 2022)
- ... Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms. Journal of Information Security, 9, 133-153. https://doi.org/10.4236/jis.2018.92010. 18. Yevseiev, S., Shmatko, O., & ...
- Created on 30 October 2022
- 20. Protection of information resources as an integral part of economic security of the enterprise
- (Content №4 2022)
- ... model and optimization algorithms are proposed for using an improved methodological approach to the formation of information security of the enterprise in terms of minimizing costs and losses. This allows ...
- Created on 29 August 2022