{"title":"Increasing the robustness of the steganographic method with code control of the additional information embedding against noise attacks","authors":"D. O. Hulid, A. Sokolov","doi":"10.15276/imms.v13.no1-2.56","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.56","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"617 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123267376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a software application for working with cyber security standards","authors":"O. Lanovska, O. Lebedeva","doi":"10.15276/imms.v13.no1-2.112","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.112","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"544 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123918194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of methods for solving operational problems of transport logistics","authors":"D. R. Horpenko, B. O. Boltenkov","doi":"10.15276/imms.v13.no1-2.34","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.34","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the application of clustering algorithms based on combined weight in manet class radio networks.","authors":"K. V. Lukina, S. Klimovych","doi":"10.15276/imms.v13.no1-2.104","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.104","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization methods and information technologies in active experiment","authors":"N. M. Yershova, L. Y. Kryvenkova","doi":"10.15276/imms.v13.no1-2.63","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.63","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. V. Zadorov, D. O. Furman, O. Stopakevych, A. Stopakevych
{"title":"Cyber security analysis systems of software and technical support of enterprise computers and sites","authors":"V. V. Zadorov, D. O. Furman, O. Stopakevych, A. Stopakevych","doi":"10.15276/imms.v13.no1-2.75","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.75","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124781564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Khoroshko, V. Kozyura, Y. Khokhlachova, N. S. Vishnevska
{"title":"Assessment of properties of information intrusions","authors":"V. Khoroshko, V. Kozyura, Y. Khokhlachova, N. S. Vishnevska","doi":"10.15276/imms.v13.no1-2.144","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.144","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"183 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intellectualization of search for the causes of failure of components of a complex technical system","authors":"V. Vychuzhanin","doi":"10.15276/imms.v13.no1-2.16","DOIUrl":"https://doi.org/10.15276/imms.v13.no1-2.16","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121121730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"McELIECE CRYPTOSYSTEM BASED ON QUATERNARY HAMMING CODES","authors":"D. A. Isakov, A. Sokolov","doi":"10.15276/imms.v12.no4.280","DOIUrl":"https://doi.org/10.15276/imms.v12.no4.280","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126028045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an application for data encryption with format preservation","authors":"T. Horbatiuk, O. Lebedieva","doi":"10.15276/imms.v12.no4.306","DOIUrl":"https://doi.org/10.15276/imms.v12.no4.306","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121501785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}