{"title":"The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments","authors":"Y. Penkin, G. Khara, A. Fedoseeva","doi":"10.1007/978-3-030-43070-2_26","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_26","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126924872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kuznetsov, Yuriy Gorbenko, I. Kolovanova, Serhii Smirnov, I. Perevozova, T. Kuznetsova
{"title":"Output Feedback Encryption Mode: Periodic Features of Output Blocks Sequence","authors":"A. Kuznetsov, Yuriy Gorbenko, I. Kolovanova, Serhii Smirnov, I. Perevozova, T. Kuznetsova","doi":"10.1007/978-3-030-43070-2_27","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_27","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116737983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ukhina, V. Sytnikov, O. Streltsov, Pavel Stupen, Dmitrii Yakovlev
{"title":"Improving the Data Processing Efficiency Based on Tunable Hard- and Software Components","authors":"H. Ukhina, V. Sytnikov, O. Streltsov, Pavel Stupen, Dmitrii Yakovlev","doi":"10.1007/978-3-030-43070-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_6","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131168042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Technologies for Analysis and Modeling of Computer Network’s Development","authors":"N. Ivanushchak, N. Kunanets, V. Pasichnyk","doi":"10.1007/978-3-030-43070-2_20","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_20","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Different Approaches to Studying the Extreme Properties of Signal Functions Synthesized with Splines","authors":"I. Strelkovskaya, I. Solovskaya, A. Makoganiuk","doi":"10.1007/978-3-030-43070-2_2","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_2","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130674526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assortativity Properties of Barabási-Albert Networks","authors":"V. Shergin, S. Udovenko, L. Chala","doi":"10.1007/978-3-030-43070-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_4","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Obod, I. Svyd, O. Maltsev, Oleksandr Vorgul, G. Maistrenko, G. Zavolodko
{"title":"Optimization of the Quality of Information Support for Consumers of Cooperative Surveillance Systems","authors":"I. Obod, I. Svyd, O. Maltsev, Oleksandr Vorgul, G. Maistrenko, G. Zavolodko","doi":"10.1007/978-3-030-43070-2_8","DOIUrl":"https://doi.org/10.1007/978-3-030-43070-2_8","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116765778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development Method of Innovative Projects in Higher Education Based on Traditional Software Building Process","authors":"Rafal Wlodarski, A. Poniszewska-Marańda","doi":"10.1007/978-3-030-34706-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-34706-2_12","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129608555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Cognitive Services Based on Machine Learning Methods in Architecture of Modern Knowledge Management Solutions","authors":"P. Tadejko","doi":"10.1007/978-3-030-34706-2_9","DOIUrl":"https://doi.org/10.1007/978-3-030-34706-2_9","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Product Usage Data Collection and Challenges of Data Anonymization","authors":"Ü. G. Peköz","doi":"10.1007/978-3-319-94117-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-94117-2_6","url":null,"abstract":"","PeriodicalId":254289,"journal":{"name":"Data-Centric Business and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125212052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}