Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Oleksandr Laptiev"'
Publikováno v:
Bulletin of the Polish Academy of Sciences: Technical Sciences, Vol 71, Iss 3 (2023)
The dynamic development of science requires constant improvement of approaches to modeling physical processes and phenomena. Practically all scientific problems can be described by systems of differential equations. Many scientific problems are descr
Externí odkaz:
https://doaj.org/article/4d064c96d5d340d0b31097be2742fe83
Publikováno v:
Axioms, Vol 12, Iss 12, p 1074 (2023)
Piezoceramic products are actively used in modern technical devices and appliances. Disk piezoelectric devices are widely used in elements of information systems: in wireless communication, elements of satellite communication, global positioning syst
Externí odkaz:
https://doaj.org/article/be74eb2910474d02807ef1c411df0af6
УДОСКОНАЛЕНА МОДЕЛЬ ОЦІНЮВАННЯ ЕКОНОМІЧНИХ ВИТРАТ НА СИСТЕМУ ЗАХИСТУ ІНФОРМАЦІЇ В СОЦІАЛЬНИХ МЕРЕЖАХ
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 4, Iss 12, Pp 19-28 (2021)
У сучасних умовах, важлива роль у забезпеченні інформаційної безпеки підприємства та особливо його економічної складової, належить про
Externí odkaz:
https://doaj.org/article/0483ad9e3acb44b3b593ff53646cd4d4
Publikováno v:
Fractal and Fractional, Vol 5, Iss 2, p 31 (2021)
The rapid growth of geographic information technologies in the field of processing and analysis of spatial data has led to a significant increase in the role of geographic information systems in various fields of human activity. However, solving comp
Externí odkaz:
https://doaj.org/article/d3f5ac5fcd8644ed99901888caa259d4
Autor:
Olha Svynchuk, Oleksandr Laptiev, Olga Tkachenko, Andrii Musienko, Oleh Barabash, Lubov Berkman
Publikováno v:
Системи управління, навігації та зв’язку. Збірник наукових праць. 3:54-59
У статті досліджено концептуальну модель інтелектуальної мережі, яку пропонується використовувати при синтезі мережі передачі керуюч
Autor:
Serhii Yevseiev, Yuliia Khokhlachova, Serhii Ostapov, Oleksandr Laptiev, Olha Korol, Stanislav Milevskyi, Oleksandr Milov, Serhii Pohasii, Yevgen Melenti, Vitalii Hrebeniuk, Alla Havrylova, Serhii Herasуmov, Roman Korolev, Oleg Barabash, Valentyn Sobchuk, Roman Kyrychok, German Shuklin, Volodymyr Akhramovych, Vitalii Savchenko, Sergii Golovashych, Oleksandr Lezik, Ivan Opirskyy, Oleksandr Voitko, Kseniia Yerhidzei, Serhii Mykus, Yurii Pribyliev, Oleksandr Prokopenko, Andrii Vlasov, Nataliia Dzheniuk, Maksym Tolkachov
The development of technologies and computing resources has not only expanded the range of digital services in all spheres of human activity, but also determined the range of targeted cyber attacks. Targeted attacks are aimed at destroying not only t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2659::dfc954004d26a281c29672eb79a52ff3
https://zenodo.org/record/8170139
https://zenodo.org/record/8170139
Autor:
Roman Kyrychok, Oleksandr Laptiev, Rostyslav Lisnevskyi, Valerii Kozlovskyi, Vitaliy Klobukov
Publikováno v:
Eastern-European Journal of Enterprise Technologies. 1:93-101
One of the leading areas of cybersecurity of communication networks is considered – the introduction of preventive mechanisms, among which the most promising are the methods of active security analysis. These methods allow, in addition to timely de
Autor:
Oleksiy Kapustyan, Valentyn Sobchuk, Taras Yusypiv, Oleksandr Laptiev, Irina Shestak, Kateryna Zinchenko
Publikováno v:
2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT).
Autor:
Volodymyr Pichkur, Oleksandr Laptiev, Igor Polovinkin, Andrii Barabash, Andrii Sobchuk, Ivanna Salanda
Publikováno v:
2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT).
Autor:
Serhii Yevseiev, Khazail Rzayev, Oleksandr Laptiev, Ruslan Hasanov, Oleksandr Milov, Bahar Asgarova, Jala Camalova, Serhii Pohasii
In modern software, crypto-algorithms are widely used for both data encryption tasks, and authentication and integrity checks. There are well-known and proven crypto-algorithms. Their cryptoresistance is either mathematically proven or based on the n
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f7a6b572128db90f0bd0a10b96348d94
https://zenodo.org/record/7384162
https://zenodo.org/record/7384162