Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Kryvoruchko Olena"'
Autor:
Kryvoruchko, Olena1 ev_kryvoruchko@ukr.net, Desiatko, Alona1 desyatko@gmail.com, Karpunin, Igor1 i.karpunin@knute.edu.ua, Hnatchenko, Dmytro1 hnatchenko@knute.edu.ua, Lakhno, Myroslav2 valss21@i.ua, Malikova, Feruza3 feruza-malikova@mail.ru, Turdaliev, Ayezhan4 auezkhan_tur@mail.ru
Publikováno v:
International Journal of Electronics & Telecommunications. 2023, Vol. 69 Issue 4, p697-705. 9p.
Autor:
Lakhno, Valerii, Akhmetov, Bakhytzhan, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona, Bereke, Madina, Shalabaeva, Maria
Publikováno v:
International Journal of Electronics & Telecommunications; 2024, Vol. 70 Issue 2, p413-420, 8p
Autor:
Lakhno, Valerii, Lakhno, Myroslav, Makulov, Kaiyrbek, Kryvoruchko, Olena, Desiatko, Alona, Chubaievskyi, Vitalii, Ishchuk, Dmytro, Kabylbekova, Viktoriya
Publikováno v:
International Journal of Electronics & Telecommunications; 2024, Vol. 70 Issue 2, p405-412, 8p
Autor:
Sabitova, Nazym, Tikhonov, Yuriy, Lakhno, Valerii, Makulov, Kariyrbek, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona, Zhumadilova, Mereke
Publikováno v:
International Journal of Electronics & Telecommunications; 2024, Vol. 70 Issue 1, p191-197, 7p
Autor:
Lakhno, Valerii, Shalabayeva, Maira, Kryvoruchko, Olena, Desiatko, Alona, Chubaievskyi, Vitalyi, Alibiyeva, Zhibek
Publikováno v:
International Journal of Electronics & Telecommunications; 2023, Vol. 69 Issue 4, p707-712, 6p
Autor:
Lakhno, Valerii, Adilzhanova, Saltanat, Ydyryshbayeva, Moldir, Turgynbayeva, Aliza, Kryvoruchko, Olena, Chubaievskyi, Vitalyi, Desiatko, Alona
Publikováno v:
International Journal of Electronics & Telecommunications; 2023, Vol. 69 Issue 1, p75-82, 8p
Autor:
Kostiuk Mykhailo, Zakharov Rostyslav, Kryvoruchko Olena, Synichuk Olena, Kazmirchuk Svitlana, Korchenko Anna
Publikováno v:
2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT).
There are many ways to organize authentication and authorization in information systems. Typically, authentication is used to provide login, and authentication is primarily a security tool for personal user data. It is the first level of protection a
Publikováno v:
Технічні науки та технології; № 2(20) (2020): Технічні науки та технології; 139-148
Technical sciences and technology; No. 2(20) (2020): Технічні науки та технології; 139-148
Технические науки и технологии; № 2(20) (2020): Технічні науки та технології; 139-148
Technical sciences and technology; No. 2(20) (2020): Технічні науки та технології; 139-148
Технические науки и технологии; № 2(20) (2020): Технічні науки та технології; 139-148
Urgency of the research. Technical progress leads to a tremendous increase in number of cybercrimes. Almost every person around the globe has a range of digital accounts containing sensitive private information which is in fact protected by simple pa
Publikováno v:
Управління розвитком складних систем; № 43 (2020); 67-75
Управление развитием сложных систем; № 43 (2020); 67-75
Management of Development of Complex Systems; № 43 (2020); 67-75
Управление развитием сложных систем; № 43 (2020); 67-75
Management of Development of Complex Systems; № 43 (2020); 67-75
This article examines the condition of our country in the global information space in terms of protection against critical infrastructure cyberattacks. Accordingly, there is a need to develop and operate such an information system that would support
Publikováno v:
Management of Development of Complex Systems; № 42 (2020); 56-62
Управление развитием сложных систем; № 42 (2020); 56-62
Управління розвитком складних систем; № 42 (2020); 56-62
Управление развитием сложных систем; № 42 (2020); 56-62
Управління розвитком складних систем; № 42 (2020); 56-62
At a time society constant informatization, the rapid information technology development, increasing the number of new software products and information systems, the question of protection against unauthorized intrusions into information systems and