Skip to main content
Skip to main navigation menu
Skip to site footer
Computer Science and Cybersecurity
About
Field and Subject matter
Submissions
About the Journal
General information
Periodocity of publication
Open access policy
History of the journal
Peer review process
Publication ethics and publication malpractice statement
Payment for publication
Plagiarism check
Journal's Open Access declaration
Current
Archives
Editorial Team
Contact
Statistics
Search
Search
Register
Login
Home
/
Archives
/
No 2 (2020)
No 2 (2020)
Issue 2(18) 2020
DOI:
https://doi.org/10.26565/2519-2310-2020-2
Published:
2020-12-28
Full Issue
PDF (Українська)
Finding the optimal VPN-solution based on the hierarchies analysis method
Нікіта Усіченко, Сабіна Рузудженк, Каріна Погоріла
4-14
pdf (Українська)
Overview of static methods of analysis malicious software
Олексій Прищепа, Олександра Доценко
15-24
pdf (Українська)
Fingerprint verification using the traveling salesman problem solution and decomposition of the vicinity of the minutiae
Ольга Мелкозьорова, Сергій Малахов, Валерія Гайкова
25-32
pdf (Українська)
Method of cryptologic data transformations
Михайло Сукнов, Ігор Громико, Євгеній Перчик
33-40
pdf (Українська)
ISSN
2519-2310
(Online)
Keywords
Make a Submission
Open Journal Systems
Language
English
Українська
A Visual Guide to
Open Journal Systems