Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 14 (2021): Cybersecurity: Education, Science, Technique
Vol. 2 No. 14 (2021): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2021.14
Published:
2021-12-30
Content
Contents
4-5
Abstract views: 496 | PDF Downloads: 139
PDF (Українська)
Articles
POTENTIAL DISGUISING ATTACK VECTORS ON SECURITY OPERATION CENTERS AND SIEM SYSTEMS
Roman Drahuntsov , Dmytro Rabchun
6-16
Abstract views: 706 | PDF Downloads: 592
DOI:
https://doi.org/10.28925/2663-4023.2021.14.614
PDF
ALGORITHM FOR DETERMINING THE MEASURE OF EXISTENCE OF UNRELIABLE INFORMATION IN THE CONDITIONS OF INFORMATION CONFLICT
Tetiana Laptievа
15-25
Abstract views: 487 | PDF Downloads: 401
DOI:
https://doi.org/10.28925/2663-4023.2021.14.1525
PDF (Українська)
USE OF DEVSECOPS APPROACH FOR INFORMATION SECURITY THREATS ANALYSIS
Vitalii Susukailo
26-35
Abstract views: 690 | PDF Downloads: 392
DOI:
https://doi.org/10.28925/2663-4023.2021.14.2635
PDF (Українська)
METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR
Volodymyr Akhramovich
36-49
Abstract views: 523 | PDF Downloads: 307
DOI:
https://doi.org/10.28925/2663-4023.2021.14.3649
PDF (Українська)
METHOD OF MARKETPLACE LEGITIMATE USER AND ATTACKER PROFILING
Diana Tsyrkaniuk, Volodymyr Sokolov, Nataliia Mazur, Valerii Kozachok, Volodymyr Astapenya
50-67
Abstract views: 1224 | PDF Downloads: 500
DOI:
https://doi.org/10.28925/2663-4023.2021.14.5067
PDF (Українська)
EXPERIMENTAL DETERMINATION OF OPTIMAL PARAMETERS OF MOBILE TELECONFERENCES
Andrii Byts, Volodymyr Sokolov, Nataliia Mazur, Valerii Kozachok, Anatoly Bessalov
68-86
Abstract views: 852 | PDF Downloads: 348
DOI:
https://doi.org/10.28925/2663-4023.2021.14.6886
PDF (Українська)
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS
Vitaliy Chubaievskyi, Valery Lakhno, Berik Akhmetov, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, Taras Litovchenko
87-99
Abstract views: 849 | PDF Downloads: 367
DOI:
https://doi.org/10.28925/2663-4023.2021.14.8799
PDF (Українська)
FORMS OF ELECTRONIC SIGNATURE AND FEATURES OF ITS USE IN SECURED INFORMATION SYSTEMS
Svitlana Palamarchuk, Natalia Palamarchuk, Vladimir Tkach, Olga Shugaly
100-106
Abstract views: 675 | PDF Downloads: 470
DOI:
https://doi.org/10.28925/2663-4023.2021.14.100106
PDF (Українська)
PROSPECTIVE METHODS OF PROTECTING THE FRAMEWORK WEB APPLICATION ON THE GRADLE AUTOMATIC ASSEMBLY SYSTEM
Anna Ilyenko , Sergii Ilyenko, Tatiana Kulish
107-117
Abstract views: 683 | PDF Downloads: 318
DOI:
https://doi.org/10.28925/2663-4023.2021.14.107117
PDF
IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES
Liudmyla Hlynchuk, Tetiana Hryshanovych, Andrii Stupin
118-130
Abstract views: 990 | PDF Downloads: 575
DOI:
https://doi.org/10.28925/2663-4023.2021.14.118130
PDF (Українська)
EXPERIMENTAL STUDIES OF THE STAND OF SIMULATION MODELING OF LASER MICROPHONE OPERATION FOR REMOVAL OF ACOUSTIC INFORMATION
Maksym Martseniuk, Pavlo Skladannyi, Volodymyr Astapenya
131-147
Abstract views: 1145 | PDF Downloads: 369
DOI:
https://doi.org/10.28925/2663-4023.2021.14.131147
PDF (Українська)
RULES FOR THE IMPLEMENTATION OF EXPLOITS DURING AN ACTIVE ANALYSIS OF THE CORPORATE NETWORKS` SECURITY BASED ON A FUZZY ASSESSMENT OF THE QUALITY OF THE VULNERABILITY VALIDATION MECHANISM
Roman Kyrychok, Zoreslava Brzhevska, Hennadii Hulak, Anatoly Bessalov, Volodymyr Astapenya
148-157
Abstract views: 1027 | PDF Downloads: 376
DOI:
https://doi.org/10.28925/2663-4023.2021.14.148157
PDF (Українська)
INFORMATION PROTECTION MODEL BASED ON INFORMATION SECURITY RISK ASSESSMENT FOR SMALL AND MEDIUM-SIZED BUSINESS
Svitlana Shevchenko, Yuliia Zhdanovа, Kateryna Kravchuk
158-175
Abstract views: 1248 | PDF Downloads: 500
DOI:
https://doi.org/10.28925/2663-4023.2021.14.158175
PDF (Українська)
IMPROVED MODULE FOR DATA CRYPTOGRAPHIC SECURITY IN MODERN INFORMATION-COMMUNICATION SYSTEMS AND NETWORKS
Sergiy Gnatyuk, Tetiana Smirnova, Rat Berdibayev, Yuliia Burmak, Dinara Ospanova
176-185
Abstract views: 882 | PDF Downloads: 358
DOI:
https://doi.org/10.28925/2663-4023.2021.14.176185
PDF (Українська)
ANALYSIS AND DESIGN OF DISTRIBUTED SYSTEMS BASED ON CLUSTER TECHNOLOGIES
Victor Grechaninov
186-191
Abstract views: 550 | PDF Downloads: 302
DOI:
https://doi.org/10.28925/2663-4023.2021.14.186191
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue