Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy

Biblio

Export 4 results:
  • RTF
  • EndNote XML
Filters: Author is Vitalii Lytvynov  [Clear All Filters]
2021
Burmaka, Ivan, Nicolai Stoianov, Vitalii Lytvynov, Mariia Dorosh, and Svitlana Lytvyn. "Proof of Stake for Blockchain Based Distributed Intrusion Detecting System." In Advances in Intelligent Systems and Computing 1265, 237-247. Cham: Springer, 2021.
  • DOI
  • Google Scholar
  • RTF
  • EndNote XML
2020
Stetsenko, Inna V., and Vitalii Lytvynov. "Computer Virus Propagation Petri-Object Simulation." In Advances in Intelligent Systems and Computing 1019, 103-112. Cham: Springer, 2020.
  • DOI
  • Google Scholar
  • RTF
  • EndNote XML
Lytvynov, Vitalii, Mariia Dorosh, Iryna Bilous, Mariia Voitsekhovska, and Valentyn Nekhai. "Development of the automated information system for organization’s information security culture level assessment." Technical sciences and technologie 1, no. 19 (2020): 124-32.
  • Google Scholar
  • RTF
  • EndNote XML
Stoianov, Nicolai, Vitalii Lytvynov, Igor Skiter, and Svitlana Lytvyn. "Traffic Abnormalities Identification Based on the Stationary Parameters Estimation and Wavelet Function Detailization." In Advances in Intelligent Systems and Computing 1019, 83-95. Cham: Springer, 2020.
  • DOI
  • Google Scholar
  • RTF
  • EndNote XML

Check also our Google Scolar profile

Tweets by PfPCConnections
  • Trending
  • Latest
  • Most cited
  • Corruption as a Cybersecurity Threat in the New World Order (3,066)
  • Social Media – Hate Speech – Hate Crime (3,049)
  • Disinformation: Policy Responses to Building Citizen Resiliency (3,045)
  • Future Development of Quantum Computing and Its Relevance to NATO (2,955)
  • Cyber Skills Gaps – A Systematic Review of the Academic Literature (2,865)
view all
  • Maritime Cyber(in)security: A Growing Threat Imperils EU Countries
  • Security Aspects of Hybrid War, COVID-19 Pandemic and Cyber-Social Vulnerabilities
  • Neo-Authoritarianism and Leadership: Outcomes for Modern Ukraine
  • How Networks of Social Cooperation Scale into Civilizations
  • Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal