An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Pubudu K. Hitigala Kaluarachchilage,
Champike Attanayake,
Sasith Rajasooriya,
Chris P. Tsokos
Method of Restoring Parameters of Information Objects in a Unified Information Space Based on Computer Networks
Vadym Mukhin,
Valerii Zavgorodnii,
Oleg Barabash,
Roman Mykolaichuk,
Yaroslav Kornaga,
Anna Zavgorodnya,
Vitalii Statkevych
Detecting Hidden Information in FAT
Kyryl Shekhanin,
Alexandr Kuznetsov,
Victor Krasnobayev,
Oleksii Smirnov
Comprehensive Methods of Evaluation of Efficiency of Distance Learning System Functioning
Oleg Barabash,
Andrii Musienko,
Spartak Hohoniants,
Oleksand Laptiev,
Oleg Salash,
Yevgen Rudenko,
Alla Klochko
Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain
Alexandr Kuznetsov,
Inna Oleshko,
Vladyslav Tymchenko,
Konstantin Lisitsky,
Mariia Rodinko,
Andrii Kolhatin
An Optimized Protocol of M2M Authentication for Internet of Things (IoT)
Mohamed M. Samy,
Wagdy R. Anis.,
Ahmed A. Abdel-Hafez,
Haitham D. Eldemerdash
The Multimedia Sentiment Model Based on Online Homestay Reviews
Wenguang Song,
Hanyu Li,
Qian Yu,
Wan Li,
Bingxin Zhang,
Qiujuan Zhang