Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2020.10
Published:
2020-12-24
Title
Title
1-3
Abstract views: 789 | PDF Downloads: 221
PDF (Українська)
Content
Contents
4-5
Abstract views: 726 | PDF Downloads: 248
PDF (Українська)
Articles
CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES
Hennadii Hulak, Volodymyr Buriachok, Pavlo Skladannyi, Lydia Kuzmenko
6-28
Abstract views: 1104 | PDF Downloads: 454
DOI:
https://doi.org/10.28925/2663-4023.2020.10.628
PDF (Українська)
THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS
Andrii Halchenko, Sergiy Choporov
29-44
Abstract views: 639 | PDF Downloads: 447
DOI:
https://doi.org/10.28925/2663-4023.2020.10.2944
PDF (Українська)
PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE
Andrii Andreichenko, Stanislav Нorbachenko, Oleh Dykyi
45-53
Abstract views: 852 | PDF Downloads: 540
DOI:
https://doi.org/10.28925/2663-4023.2020.10.4553
PDF (Українська)
ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS
Andrii Karpenko, Tetiana Bondarenko, Viacheslav Ovsiannikov, Valerii Martyniuk
54-66
Abstract views: 885 | PDF Downloads: 586
DOI:
https://doi.org/10.28925/2663-4023.2020.10.5466
PDF (Українська)
MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR
Yanina Roy, Olena Riabchun, Valeriy Yermoshin
67-74
Abstract views: 855 | PDF Downloads: 476
DOI:
https://doi.org/10.28925/2663-4023.2020.10.6774
PDF (Українська)
METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS
Anna Ilyenko , Sergii Ilyenko , Oleksandr Vertypolokh
75-87
Abstract views: 1025 | PDF Downloads: 792
DOI:
https://doi.org/10.28925/2663-4023.2020.10.7587
PDF (Українська)
ANALYSIS OF THE USE OF SOFTWARE BAITS (HONEYPOTS) AS A MEANS OF ENSURING INFORMATION SECURITY
Ivan Opirskyy, Sviatoslav Vasylyshyn , Andrian Piskozub
88-97
Abstract views: 997 | PDF Downloads: 540
DOI:
https://doi.org/10.28925/2663-4023.2020.10.8897
PDF (Українська)
APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM
Iryna Litvinchuk, Ruslan Korchomnyi , Nataliia Korshun , Maksym Vorokhob
98-112
Abstract views: 2390 | PDF Downloads: 889
DOI:
https://doi.org/10.28925/2663-4023.2020.10.98112
PDF (Українська)
MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS
Valeriy Lakhno, Andriy Blozva, Maksym Misiura , Dmytro Kasatkin , Borys Gusev
113-122
Abstract views: 1011 | PDF Downloads: 422
DOI:
https://doi.org/10.28925/2663-4023.2020.10.113122
PDF (Українська)
THE IMPROVEMENT OF NTRUENCRYPT PUBLIC KEY CRYPTOSYSTEM: DESIGN AND PERFORMANCE EVALUATION
Anna Ilyenko , Sergii Ilyenko , Olena Prokopenko
123-134
Abstract views: 857 | PDF Downloads: 423
DOI:
https://doi.org/10.28925/2663-4023.2020.10.123134
PDF
METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY
Iryna Litvinchuk, Nataliia Korshun , Maksym Vorokhob
135-143
Abstract views: 836 | PDF Downloads: 517
DOI:
https://doi.org/10.28925/2663-4023.2020.10.135143
PDF (Українська)
ORGANIZATION OF PROTECTION OF KNOWLEDGE CONTROL RESULTS IN DISTANCE LEARNING SYSTEMS
Oleh Harasymchuk, Ivan Opirskyy, Yaroslav Sovyn, Ivan Tyshyk, Yevhenij Shtefaniuk
144-157
Abstract views: 862 | PDF Downloads: 466
DOI:
https://doi.org/10.28925/2663-4023.2020.10.144157
PDF (Українська)
CONDUCTING A SWOT-ANALYSIS OF INFORMATION RISK ASSESSMENT AS A MEANS OF FORMATION OF PRACTICAL SKILLS OF STUDENTS SPECIALTY 125 CYBER SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva , Pavlo Skladannyi
158-168
Abstract views: 1888 | PDF Downloads: 850
DOI:
https://doi.org/10.28925/2663-4023.2020.10.158168
PDF (Українська)
CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES
Serhii Tolіupa , Oleksandr Pliushch , Ivan Parkhomenko
169-183
Abstract views: 1234 | PDF Downloads: 811
DOI:
https://doi.org/10.28925/2663-4023.2020.10.169183
PDF (Українська)
WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
Sergiy Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
184-196
Abstract views: 1025 | PDF Downloads: 554
DOI:
https://doi.org/10.28925/2663-4023.2020.10.184196
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue