Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Yaroslav Dorohyi"'
Publikováno v:
Collection "Information Technology and Security". 8:92-101
Autor:
Yaroslav Dorohyi
Publikováno v:
Collection "Information technology and security". 7:114-125
One of the most effective solutions for protecting personal data when building a Unified Identity Registry is to share end-to-end identifier and hash codes generated from combinations of personal data using one-sided hash functions. This is due to th
Autor:
Yaroslav Dorohyi, Oleksandr Svyrydenko
The research provides a detailed analysis of approaches to creating AI in video games. The main area of research is AI for real-time strategies, as this genre is characterized by the complexity of the game environment and the practice of creating a c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19a96bbaf26f443ab11f0059d53606dc
https://doi.org/10.20535/2411-1031.2021.9.2.249882
https://doi.org/10.20535/2411-1031.2021.9.2.249882
Publikováno v:
COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES; 2020: COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES
Комп’ютерні та інформаційні системи і технології; 2020: Fourth International Scientific and Technical Conference COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES»
Комп’ютерні та інформаційні системи і технології; 2020: Fourth International Scientific and Technical Conference COMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES»
The use of ISO / IEC 27000 and ISO Guide 73 standards as glossaries of terms regarding the information security management system is considered. The establishment of correlation between terms on the ontological approach is shown. Attention is drawn t
Publikováno v:
Collection "Information technology and security". 6:124-144
Проведен детальный анализ исследований методов и алгоритмов размещения ресурсов виртуализированных ИТ-инфраструктур. Рассмотрена кла
Publikováno v:
Information Technology and Security : Ukrainian research papers collection, 2017, Vol. 5, Iss. 2 (9)
Досліджено концепцію архітектури критичної інформаційної інфраструктури шляхом аналізування десяти корпоративних архітектурних пла
Autor:
Heorhii Krykhovetskyi, Volodymyr Mokhor, Ihor Bohdanov, Vasyl Tsurkan, Yaroslav Dorohyi, Oleksandr Bakalynskyi, Serhii Mykhailov
Publikováno v:
Collection "Information technology and security". 4:255-261
Publikováno v:
Collection "Information Technology and Security"; Vol. 6 No. 1 (2018); 96-107
Сборник "Information Technology and Security"; Том 6 № 1 (2018); 96-107
Collection "Information Technology and Security"; Том 6 № 1 (2018); 96-107
Сборник "Information Technology and Security"; Том 6 № 1 (2018); 96-107
Collection "Information Technology and Security"; Том 6 № 1 (2018); 96-107
The problems of creating a critical IT infrastructure of the ministry are analyzed. The classic model of cloud services, which consists of three layers, is considered. It has been shown that the specificity of the tasks performed by the ministries (d
Publikováno v:
Collection "Information technology and security". 3:138-146