| Article | ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS | Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed
by methods of compression, is represented. Two basic parameters for evaluation of info | 
| Article | ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ... | Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual enviro | 
| Article | ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT | Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual enviro | 
| Article | APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ... | Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’
groups of compression, to the co-efficient of information security of selected objects� | 
| Article | CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... | Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review
of the main DRM systems and methods used in e-learning, an examination is made of parti | 
| Article | CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS | Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In
contrast to traditional biometric systems, proposed algorithm does not authenticate user by | 
| Article | EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... | Abstract: The principal methods of compression and different types of non-encrypted objects are described. An
analysis is made of the results obtained from examinations of the speed of compression fo | 
| Article | IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS | Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small
devices are very widespread around the world - security are still being understood. As a result | 
| Article | INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ... | Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89
information attacks, joined in 33 groups and 73 methods of compression, joined in 10 grou | 
| Article | INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ... | Abstract: This report examines important issues related to different ways to influence the information security of file objects, subjected to information attacks by the methods of compression. Accordi | 
| Article | PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS | Abstract: The paper is devoted to analysis of effectiveness the usage of modern statistical model of
digital image for revealing the stego images with data, embedded in transformation domain of cover | 
| Article | RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ... | Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to
information attacks and processed with methods of compression, is represented. A co-eff | 
| Article | THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS | Abstract: This paper suggest a generic threat model for the processes in e-learning systems. After a breaf
discussion of the particularities of e-learning systems from the security point of view, the | 
| Article | VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ... | Abstract: The paper represents a verification of a previously developed conceptual model of security related
processes in DRM implementation. The applicability of established security requirements in | 
| Article | КОСВЕННАЯ СТЕГАНОГРАФИЯ | Аннотация: Описывается оригинальный метод шифрования и дешифрования на основе способа,
называемого косвенн |