ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Theoretical and Applied Cybersecurity
Latest Publications
TOTAL DOCUMENTS
28
(FIVE YEARS 28)
H-INDEX
1
(FIVE YEARS 1)
Published By Kyiv Politechnic Institute
2664-2913
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Features of Ensuring Cybersecurity of the Critical Infrastructure of the State
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209484
◽
2020
◽
Vol 2
(1)
◽
Author(s):
Y. Danyk
◽
Ch. Briggs
◽
T. Maliarchuk
Keyword(s):
Critical Infrastructure
◽
The State
Download Full-text
Mobile driving license system deployment model with security enhancement
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209436
◽
2020
◽
Vol 2
(1)
◽
Author(s):
V. Blynkov
◽
V. Yaremenko
Keyword(s):
Driving License
◽
Security Enhancement
◽
License System
Download Full-text
Aspects of blockchain reliability considering its consensus algorithms
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209430
◽
2020
◽
Vol 2
(1)
◽
Author(s):
K.S. Gorniak
◽
A.M. Kudin
Keyword(s):
Consensus Algorithms
Download Full-text
Comparison of Efficiency of Statistical Models Used for Formation of Feature Vectors by JPEG Images Steganalysis
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209433
◽
2020
◽
Vol 2
(1)
◽
Author(s):
Nataliya Koshkina
Keyword(s):
Statistical Models
◽
Jpeg Images
◽
Feature Vectors
Download Full-text
Machine learning based network traffic classification approach for Internet of Things devices
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209472
◽
2020
◽
Vol 2
(1)
◽
Author(s):
V. Melnyk
◽
P. Haleta
◽
N. Golphamid
Keyword(s):
Machine Learning
◽
Internet Of Things
◽
Network Traffic
◽
Traffic Classification
◽
Classification Approach
◽
Network Traffic Classification
Download Full-text
Wavelet and fractal analysis based news spreading model
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209481
◽
2020
◽
Vol 2
(1)
◽
Author(s):
B. Smetanyuk
◽
V. Mishyn
◽
Y. Nakonechna
Keyword(s):
Fractal Analysis
◽
Spreading Model
Download Full-text
DeeDP: vulnerability detection and patching based on deep learning
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209465
◽
2020
◽
Vol 2
(1)
◽
Author(s):
A. Savchenko
◽
O. Fokin
◽
A. Chernousov
◽
O. Sinelnikova
◽
S. Osadchyi
Keyword(s):
Deep Learning
◽
Vulnerability Detection
Download Full-text
Reinforced machine learning methods for testing quality of cyber threat prediction results
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209432
◽
2020
◽
Vol 2
(1)
◽
Author(s):
A.B. Kachynskyi
◽
N.A. Tsebrinska
Keyword(s):
Machine Learning
◽
Learning Methods
◽
Machine Learning Methods
◽
Cyber Threat
Download Full-text
On the usage of postquantum protocols defined in terms of transformation semi- groups and their homomophisms
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209435
◽
2020
◽
Vol 2
(1)
◽
Author(s):
V. Ustimenko
Download Full-text
Detection and correction of database schema integrity violation based on initialization scripts
Theoretical and Applied Cybersecurity
◽
10.20535/tacs.2664-29132020.1.209464
◽
2020
◽
Vol 2
(1)
◽
Author(s):
O. Kondratiuk
◽
M. Kolomitsev
Keyword(s):
Database Schema
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close