S Fedushko, R Malyi, Y Syerov, P Serdyuk - Data & Knowledge …, 2024 - Elsevier
In Agile development, one approach cannot be chosen and used all the time. Constant updates and strategy changes are necessary. We want to show that combining several …
О Korystin, S Nataliia, O Mitina - International Journal of …, 2022 - search.proquest.com
The paper focuses on the study of cyber security in Ukraine and creation of a predictive model for reducing the risk of identified cyber threats. Forecasting is performed using a …
Vulnerability databases are instrumental in tracking and understanding software security threats. Among these, the National Vulnerability Database (NVD), maintained by the US …
OE Korystin, O Korchenko, S Kazmirchuk, S Demediuk… - mecs-press.org
Applied results of scientific analysis should be the key focus of modern security research. A comparative analysis of research results obtained using different methods, as an applied …