<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "information security"</title>
    <description>Showing 1 - 31 results of 31</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22information+security%22&amp;type=Subject&amp;lng=en</link>
    <opensearch:totalResults>31</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22information%20security%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22information+security%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22information+security%22&amp;type=Subject&amp;lng=en&amp;page=1"/>
    <atom:link rel="self" type="application/rss+xml" href="https://harvester.nas.gov.ua/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22information+security%22&amp;type=Subject&amp;lng=en"/>
    <item>
      <title>Semantic approach to automated formation   of information security systems documentation</title>
      <pubDate>Sun, 29 Mar 2026 01:00:30 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-878</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-878</guid>
      <author>Bova, Yu.V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2026</dc:date>
      <dc:creator>Bova, Yu.V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Automation of standardized cyber insurance processes</title>
      <pubDate>Wed, 17 Sep 2025 09:27:02 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/es-journalinua-article-335837</link>
      <guid>https://harvester.nas.gov.ua/Record/es-journalinua-article-335837</guid>
      <author>Khudyntsev, Mykola</author>
      <dc:format>Article</dc:format>
      <dc:date>2025</dc:date>
      <dc:creator>Khudyntsev, Mykola</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybersecurity maturity models for cybersecurity assessment in critical infrastructure</title>
      <pubDate>Thu, 17 Jul 2025 11:19:50 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/es-journalinua-article-321303</link>
      <guid>https://harvester.nas.gov.ua/Record/es-journalinua-article-321303</guid>
      <author>Khudyntsev, Mykola M.</author>
      <dc:format>Article</dc:format>
      <dc:date>2024</dc:date>
      <dc:creator>Khudyntsev, Mykola M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems</title>
      <pubDate>Thu, 17 Jul 2025 11:17:46 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/es-journalinua-article-172547</link>
      <guid>https://harvester.nas.gov.ua/Record/es-journalinua-article-172547</guid>
      <author>Chepkov, Ihor B.</author>
      <dc:format>Article</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Chepkov, Ihor B.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Resilience and stability in security</title>
      <pubDate>Thu, 17 Jul 2025 10:59:00 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-308655</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-308655</guid>
      <author>Мохор, В. В.</author>
      <dc:format>Article</dc:format>
      <dc:date>2024</dc:date>
      <dc:creator>Мохор, В. В.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Mathematical models and methods for solving some problems on the information security</title>
      <pubDate>Thu, 17 Jul 2025 10:58:52 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-300525</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-300525</guid>
      <author>Никифоров, О. В.</author>
      <dc:format>Article</dc:format>
      <dc:date>2023</dc:date>
      <dc:creator>Никифоров, О. В.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security of decision support systems based on decentralized data platforms</title>
      <pubDate>Thu, 17 Jul 2025 10:58:50 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-287172</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-287172</guid>
      <author>Савченко, М. М.</author>
      <dc:format>Article</dc:format>
      <dc:date>2023</dc:date>
      <dc:creator>Савченко, М. М.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks</title>
      <pubDate>Thu, 17 Jul 2025 10:58:41 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-265720</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-265720</guid>
      <author>Дьогтєва, І. О.</author>
      <dc:format>Article</dc:format>
      <dc:date>2021</dc:date>
      <dc:creator>Дьогтєва, І. О.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object</title>
      <pubDate>Thu, 17 Jul 2025 10:58:05 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-218974</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-218974</guid>
      <author>Saliieva, O. V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Saliieva, O. V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats</title>
      <pubDate>Thu, 17 Jul 2025 10:58:00 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-211279</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-211279</guid>
      <author>Saliieva, O. V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Saliieva, O. V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Improvement of role-based access control model in private cloud environments</title>
      <pubDate>Thu, 17 Jul 2025 10:57:48 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-199370</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-199370</guid>
      <author>Volynets, O. Yu.</author>
      <dc:format>Article</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Volynets, O. Yu.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Development of a cognitive model for analysis of the impact of threats on the security level of a computer network</title>
      <pubDate>Thu, 17 Jul 2025 10:57:47 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-199268</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-199268</guid>
      <author>Saliieva, O. V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Saliieva, O. V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.</title>
      <pubDate>Thu, 17 Jul 2025 10:57:29 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-179058</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-179058</guid>
      <author>Pavlenko, B. V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Pavlenko, B. V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Securing virtual machines with AMD Zen CPU architecture and instruction set</title>
      <pubDate>Thu, 17 Jul 2025 10:57:23 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-158525</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-158525</guid>
      <author>Sokolovskyi, V. S.</author>
      <dc:format>Article</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Sokolovskyi, V. S.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Neural network based method of a user identification by keyboard handwriting</title>
      <pubDate>Thu, 17 Jul 2025 10:57:05 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-142913</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-142913</guid>
      <author>Danyliuk, I. I.</author>
      <dc:format>Article</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Danyliuk, I. I.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems</title>
      <pubDate>Thu, 17 Jul 2025 10:56:14 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-105050</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-105050</guid>
      <author>Lande, D. V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2012</dc:date>
      <dc:creator>Lande, D. V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Method of Digital Signature Producing and Verification Based on Recurrent Sequences</title>
      <pubDate>Thu, 17 Jul 2025 10:55:58 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-103423</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-103423</guid>
      <author>Iaremchuk, Iu. Е.</author>
      <dc:format>Article</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Iaremchuk, Iu. Е.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Authentication Method of Interaction Parties Based on Reccurent Sequences</title>
      <pubDate>Thu, 17 Jul 2025 10:55:51 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-103381</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-103381</guid>
      <author>Yaremchuk, Yu. Е.</author>
      <dc:format>Article</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Yaremchuk, Yu. Е.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes</title>
      <pubDate>Thu, 17 Jul 2025 10:55:40 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-103361</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-103361</guid>
      <author>Iaremchuk, Iu. E.</author>
      <dc:format>Article</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Iaremchuk, Iu. E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Problems of active protection of information from leakage through vibroacoustic channels</title>
      <pubDate>Thu, 17 Jul 2025 10:55:37 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-101220</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-101220</guid>
      <author>Kataiev, V. С.</author>
      <dc:format>Article</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Kataiev, V. С.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes</title>
      <pubDate>Thu, 17 Jul 2025 10:55:31 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100352</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100352</guid>
      <author>Mаtоv, O. Y.</author>
      <dc:format>Article</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Mаtоv, O. Y.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs</title>
      <pubDate>Thu, 17 Jul 2025 10:55:26 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100345</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100345</guid>
      <author>Yaremchuk, Yu. E.</author>
      <dc:format>Article</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Yaremchuk, Yu. E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3</title>
      <pubDate>Thu, 17 Jul 2025 10:55:15 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100328</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100328</guid>
      <author>Yaremchuk, Yu. E.</author>
      <dc:format>Article</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Yaremchuk, Yu. E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Classification of information security threats to computer systems for remote data processing</title>
      <pubDate>Thu, 17 Jul 2025 10:55:09 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100318</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100318</guid>
      <author>Korpan, Y. V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Korpan, Y. V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Modelling of choice on the optimal method for counteract of information security threats</title>
      <pubDate>Thu, 17 Jul 2025 10:54:58 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100287</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100287</guid>
      <author>Nikiforova, L. O.</author>
      <dc:format>Article</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Nikiforova, L. O.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Specialized Processors for Realization of Authentication of Subjects (objects) of Interaction Based on Recurrent Sequences</title>
      <pubDate>Thu, 17 Jul 2025 10:54:38 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100238</link>
      <guid>https://harvester.nas.gov.ua/Record/drspiprikievua-article-100238</guid>
      <author>Iaremchuk, I. E.</author>
      <dc:format>Article</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Iaremchuk, I. E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Flow based bonet traffic detection using AI</title>
      <pubDate>Thu, 17 Jul 2025 09:57:06 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-538</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-538</guid>
      <author>Panchuk, B.O.</author>
      <dc:format>Article</dc:format>
      <dc:date>2023</dc:date>
      <dc:creator>Panchuk, B.O.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ontology-based semantic similarity to metadata analysis in the information security domain</title>
      <pubDate>Thu, 17 Jul 2025 09:56:26 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-459</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-459</guid>
      <author>Gladun, A.Y.</author>
      <dc:format>Article</dc:format>
      <dc:date>2021</dc:date>
      <dc:creator>Gladun, A.Y.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policy in the systems of information and analytical maintenance for support of organizational decisions</title>
      <pubDate>Thu, 17 Jul 2025 09:54:49 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-216</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-216</guid>
      <author>Churubrova, S.M.</author>
      <dc:format>Article</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Churubrova, S.M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Protecting public clients using an authorization algorithm</title>
      <pubDate>Thu, 17 Jul 2025 09:51:54 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-542</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-542</guid>
      <author>Bodak, B.V.</author>
      <dc:format>Article</dc:format>
      <dc:date>2023</dc:date>
      <dc:creator>Bodak, B.V.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Development of decision support system using OLAP-technologies for information security monitoring systems</title>
      <pubDate>Thu, 17 Jul 2025 09:41:21 +0000</pubDate>
      <link>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-541</link>
      <guid>https://harvester.nas.gov.ua/Record/pp_isofts_kiev_ua-article-541</guid>
      <author>Dashdamirova, K.Q.</author>
      <dc:format>Article</dc:format>
      <dc:date>2023</dc:date>
      <dc:creator>Dashdamirova, K.Q.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
