Пошук


Почати новий пошук
Додати фільтри:

Використовуйте фільтри для уточнення результатів пошуку.


Результати 21-30 зі 137 (час пошуку: 0.007 секунди).
Знайдені матеріали:
Дата випускуНазваАвтор(и)
2020Development of Methods for Improving Crypto Transformations in the Block-Symmetric CodeKochan R.; Yevseiev S. P.; Korolyov R. V.; Milevskyi S. V.; Ireifidzh I.; Gancarczyk T.; Szklarczyk R.
2020Development of an advanced method of video information resource compression in navigation and traffic control systemsYevseiev S.; Abdalla Ah.; Osiievskyi S. V.; Larin V.; Lytvynenko M.
2020Improvement of project risk assessment methods of implementation of automated information components of non-commercial organizational and technical systemsAndroshchuk А.; Yevseiev S.; Melenchuk V.; Lemeshko O.; Lemeshko V.
2020Development and analysis of game-theoretical models of security systems agents interactionYevseiev S.; Milov O. V.; Milevskyi S. V.; Voitko O.; Kasianenko M.; Melenti Y.; Pohasii S.; Stepanov H.; Turinskyi O.; Faraon S.
2020Development of methodological foundations for designing a classifier of threats to cyberphysical systemsShmatko O. V.; Balakireva S.; Vlasov A.; Zagorodna N.; Korol O. G.; Milov O. V.; Petrov O.; Pohasii S.; Rzayev Kh. N.; Khvostenko V.
2020Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post-quantum periodYevseiev S. P.; Korolyov R. V.; Tkachov A.; Laptiev O.; Opirskyy I.; Soloviova O.
2020The new method for detecting signals of means of covert obtaining informationLaptiev O.; Savchenko V.; Yevseiev S.; Haidur H.; Gakhov S.; Hohoniants S.
2021Modeling the protection of personal data from trust and the amount of information on social networksYevseiev S.; Laptiev O.; Lazarenko S.; Korchenko A.; Manzhul І.
2019Development of a scenario modeling of conflict tools in a security system based on formal grammarsMilov O. V.; Yevseiev S. P.; Vlasov A.; Herasimov S.; Dmitriiev O.; Kasianenko M.; Pievtsov H.; Peleshok Y.; Tkach Y.; Faraon S.
2019Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomyYevseiev S. P.; Aleksiyev V. O.; Balakireva S.; Peleshok Y.; Milov O. V.; Petrov O.; Rayevnyeva O. V.; Tomashevsky B.; Tyshyk I.; Shmatko O. V.