Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 9 (2020): Cybersecurity: Education, Science, Technique
Vol. 1 No. 9 (2020): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2020.9
Published:
2020-09-24
Title
Title
1-3
Abstract views: 744 | PDF Downloads: 220
PDF (Українська)
Content
Contents
4-5
Abstract views: 728 | PDF Downloads: 267
PDF (Українська)
Articles
THE COMPLEXITY OF THE FUNCTIONAL SECURITY ASSESSMENT ALGORITHM FOR INFORMATION TECHNOLOGIES FOR THE CREATION OF WARRANTY AUTOMATED SYSTEMS
Hennadii Hulak
6-23
Abstract views: 658 | PDF Downloads: 340
DOI:
https://doi.org/10.28925/2663-4023.2020.9.623
PDF (Українська)
THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD
Anna Ilyenko , Sergii Ilyenko , Diana Kvasha
24-36
Abstract views: 1855 | PDF Downloads: 736
DOI:
https://doi.org/10.28925/2663-4023.2020.9.2436
PDF (Українська)
ANALYSIS OF THE PROBLEMS OF USE OF ELECTRONIC RELIABLE SERVICES IN THE ARMED FORCES OF UKRAINE
Yuliia Chernysh, Irina Maltseva, Nataliya Palamarchuk
37-44
Abstract views: 576 | PDF Downloads: 350
DOI:
https://doi.org/10.28925/2663-4023.2020.9.3744
PDF (Українська)
CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS
Valerii Lakhno, Borys Husiev, Andrii Blozva, Dmytro Kasatkin, Tetiana Osypova
45-58
Abstract views: 870 | PDF Downloads: 514
DOI:
https://doi.org/10.28925/2663-4023.2020.9.4558
PDF (Українська)
ANALYSIS OF THE USE OF CLOUD SERVICES FOR FISHING ATTACKS
Ivan Opirskyy, Andrii Vynar
59-68
Abstract views: 1006 | PDF Downloads: 524
DOI:
https://doi.org/10.28925/2663-4023.2020.9.5968
PDF (Українська)
DEVELOPMENT OF ALOGORITHM FOR ENCRYPTION OF MESSAGES IN THE WIRELESS SENSOR NETWORK
Oleksandr Belei, Oksana Svatiuk
69-84
Abstract views: 870 | PDF Downloads: 402
DOI:
https://doi.org/10.28925/2663-4023.2020.9.6984
PDF (Українська)
CYBER SECURITY IS ONE OF THE MOST IMPORTANT CONSTITUENTS OF THE ENTIRE SYSTEM OF PROTECTION IN THE ARMED FORCES OF UKRAINE
Irina Maltseva, Yuliya Chernysh , Оleksii Cherednichenko
85-92
Abstract views: 553 | PDF Downloads: 586
DOI:
https://doi.org/10.28925/2663-4023.2020.9.8592
PDF (Українська)
AUTOMATIC PILOT SYSTEM FOR UNMANNED OF AIRCRAFT IN THE ABSENCE OF RADIO COMMUNICATION
Tetyana Shabelnik , Serhii Krivenko , Olena Koneva
93-103
Abstract views: 1086 | PDF Downloads: 520
DOI:
https://doi.org/10.28925/2663-4023.2020.9.93103
PDF (Українська)
MODEL OF FORMATION OF STUDY EXAMPLES OF THE NEURAL NETWORK INTENDED FOR THE ANALYSIS OF THE KEYBOARD HANDWRITING
Liudmyla Tereikovska
104-114
Abstract views: 566 | PDF Downloads: 433
DOI:
https://doi.org/10.28925/2663-4023.2020.9.104114
PDF (Українська)
TRANSFORMANTS CODING TECHNOLOGY IN THE CONTROL SYSTEM OF VIDEO STREAMS BIT RATE
Volodymyr Barannik, Yurii Babenko , Valeriy Barannik , Valerii Yroshenko , Sergii Shulgin
115-125
Abstract views: 509 | PDF Downloads: 367
DOI:
https://doi.org/10.28925/2663-4023.2020.9.115125
PDF (Українська)
USE OF PSEUDO NOISE CODING SEQUENCE CYCLIC SHIFTS FOR TELECOMMUNICATION CHANNEL PERFORMANCE IMPROVEMENT
Oleksandr Pliushch
126-139
Abstract views: 577 | PDF Downloads: 388
DOI:
https://doi.org/10.28925/2663-4023.2020.9.126139
PDF (Українська)
FEATURES OF CONSTRUCTION AND BASIC DIRECTIONS OF DEVELOPMENT OF VIRTUAL DIGITAL ASSISTANTS
Oleksandra Tsyra, Nataliia Punchenko, Oleksii Fraze-Frazenko
140-148
Abstract views: 720 | PDF Downloads: 541
DOI:
https://doi.org/10.28925/2663-4023.2020.9.140148
PDF (Українська)
REQUIREMENTS ANALYSIS METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS
Vasyl Tsurkan
149-158
Abstract views: 640 | PDF Downloads: 471
DOI:
https://doi.org/10.28925/2663-4023.2020.9.149158
PDF (Українська)
APPLICATION OF NI MULTISIM ENVIRONMENT IN THE PRACTICAL SKILLS BUILDING FOR STUDENTS OF 125 "CYBERSECURITY" SPECIALTY
Volodymyr Buriachok , Nataliia Korshun , Svitlana Shevchenko , Pavlo Skladannyi
159-169
Abstract views: 1554 | PDF Downloads: 592
DOI:
https://doi.org/10.28925/2663-4023.2020.9.159169
PDF (Українська)
BASIC ASPECTS OF CONFIDENTIAL INFORMATION SECURITY IN CRITICAL INFORMATION INFRASTRUCTURE OBJECTS
Sergiy Gnatyuk, Viktoriia Sydorenko, Yuliia Sotnichenko
170-181
Abstract views: 1045 | PDF Downloads: 647
DOI:
https://doi.org/10.28925/2663-4023.2020.9.170181
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue