<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Результати для "UDC 004.056"</title>
    <description>Показ 1 - 17 результатів із 17</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22UDC+004.056%22&amp;type=Subject&amp;lng=uk</link>
    <opensearch:totalResults>17</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22UDC%20004.056%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="На першу сторінку" href="https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22UDC+004.056%22&amp;type=Subject&amp;lng=uk"/>
    <atom:link rel="last" type="application/rss+xml" title="На останню сторінку" href="https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22UDC+004.056%22&amp;type=Subject&amp;lng=uk&amp;page=1"/>
    <atom:link rel="self" type="application/rss+xml" href="https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22UDC+004.056%22&amp;type=Subject&amp;lng=uk"/>
    <item>
      <title>Risk-adaptive  authorization in zero trust with dynamic trust and tokens</title>
      <pubDate>Fri, 01 May 2026 01:00:47 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-892</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-892</guid>
      <author>Kostiuk, Yu.V.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2026</dc:date>
      <dc:creator>Kostiuk, Yu.V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Semantic approach to automated formation   of information security systems documentation</title>
      <pubDate>Fri, 01 May 2026 01:00:42 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-878</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-878</guid>
      <author>Bova, Yu.V.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2026</dc:date>
      <dc:creator>Bova, Yu.V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>An approach to website   vulnerability detection based on static and dynamic analysis</title>
      <pubDate>Fri, 01 May 2026 01:00:33 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-875</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-875</guid>
      <author>Popereshnyak, S.V.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2026</dc:date>
      <dc:creator>Popereshnyak, S.V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Developing a conceptual framework  for resilience in information systems</title>
      <pubDate>Fri, 01 May 2026 01:00:31 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-611</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-611</guid>
      <author>Korobeynikov, F.O.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2024</dc:date>
      <dc:creator>Korobeynikov, F.O.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Integrated security systems   for protecting payment synchronization from MITM attacks</title>
      <pubDate>Tue, 04 Nov 2025 02:10:15 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-835</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-835</guid>
      <author>Shahmatov, I.O.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Shahmatov, I.O.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital twins in intrusion   detection systems based on deep learning</title>
      <pubDate>Tue, 04 Nov 2025 02:10:12 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-834</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-834</guid>
      <author>Letychevskyi, O.O.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Letychevskyi, O.O.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The Code is based on random numbers with irregular distribution</title>
      <pubDate>Wed, 17 Sep 2025 09:24:45 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-830</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-830</guid>
      <author>Mikhersky, R.M.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Mikhersky, R.M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The problems of massive construction of the integrated information security system (IISS) and a ways of their solution</title>
      <pubDate>Wed, 17 Sep 2025 09:24:06 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-818</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-818</guid>
      <author>Koltyk, M.A.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Koltyk, M.A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Technology system integration of hardware and software data protection</title>
      <pubDate>Wed, 17 Sep 2025 09:24:02 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-817</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-817</guid>
      <author>Alishоv, N.I.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Alishоv, N.I.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Methods and ways for realization of the automated support testing of the integrated information security system</title>
      <pubDate>Wed, 17 Sep 2025 09:22:46 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-789</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-789</guid>
      <author>Koltyk, M. A.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Koltyk, M. A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Neurosymbolic models for ensuring cybersecurity in critical  cyberphysical systems</title>
      <pubDate>Wed, 17 Sep 2025 09:20:58 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-765</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-765</guid>
      <author>Yevdokymov, S.O.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Yevdokymov, S.O.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Characteristics of information flows of software modules included in the software for automated support of ...</title>
      <pubDate>Thu, 17 Jul 2025 10:08:56 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-756</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-756</guid>
      <author>Borovskaya, E.N.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Borovskaya, E.N.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>System-ontological analysis the subject area of testing integrated information security system (IISS)</title>
      <pubDate>Thu, 17 Jul 2025 09:58:29 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-732</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-732</guid>
      <author>Koltyk, M.A.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Koltyk, M.A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ontology-based semantic similarity to metadata analysis in the information security domain</title>
      <pubDate>Thu, 17 Jul 2025 09:56:26 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-459</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-459</guid>
      <author>Gladun, A.Y.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2021</dc:date>
      <dc:creator>Gladun, A.Y.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policy in the systems of information and analytical maintenance for support of organizational decisions</title>
      <pubDate>Thu, 17 Jul 2025 09:54:49 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-216</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-216</guid>
      <author>Churubrova, S.M.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Churubrova, S.M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Reputation-based secyrity for heterogtneous structurally complex systems</title>
      <pubDate>Thu, 17 Jul 2025 09:53:57 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-92</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-92</guid>
      <author>Kussul, O.M.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Kussul, O.M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Complex approach for state critical information infrastructure cyber defence system constructing</title>
      <pubDate>Thu, 17 Jul 2025 09:39:38 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-301</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-301</guid>
      <author>Synitsyn, I.P.</author>
      <dc:format>Стаття</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Synitsyn, I.P.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
