Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
Vol. 2 No. 10 (2020): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2020.10
Published:
2020-12-24
Title
Title
1-3
Abstract views: 357 | PDF Downloads: 119
PDF (Українська)
Content
Contents
4-5
Abstract views: 332 | PDF Downloads: 136
PDF (Українська)
Articles
CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES
Hennadii Hulak, Volodymyr Buriachok, Pavlo Skladannyi, Lydia Kuzmenko
6-28
Abstract views: 499 | PDF Downloads: 282
DOI:
https://doi.org/10.28925/2663-4023.2020.10.628
PDF (Українська)
THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS
Andrii Halchenko, Sergiy Choporov
29-44
Abstract views: 365 | PDF Downloads: 287
DOI:
https://doi.org/10.28925/2663-4023.2020.10.2944
PDF (Українська)
PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE
Andrii Andreichenko, Stanislav Нorbachenko, Oleh Dykyi
45-53
Abstract views: 539 | PDF Downloads: 366
DOI:
https://doi.org/10.28925/2663-4023.2020.10.4553
PDF (Українська)
ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS
Andrii Karpenko, Tetiana Bondarenko, Viacheslav Ovsiannikov, Valerii Martyniuk
54-66
Abstract views: 579 | PDF Downloads: 389
DOI:
https://doi.org/10.28925/2663-4023.2020.10.5466
PDF (Українська)
MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR
Yanina Roy, Olena Riabchun, Valeriy Yermoshin
67-74
Abstract views: 455 | PDF Downloads: 274
DOI:
https://doi.org/10.28925/2663-4023.2020.10.6774
PDF (Українська)
METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS
Anna Ilyenko , Sergii Ilyenko , Oleksandr Vertypolokh
75-87
Abstract views: 564 | PDF Downloads: 601
DOI:
https://doi.org/10.28925/2663-4023.2020.10.7587
PDF (Українська)
ANALYSIS OF THE USE OF SOFTWARE BAITS (HONEYPOTS) AS A MEANS OF ENSURING INFORMATION SECURITY
Ivan Opirskyy, Sviatoslav Vasylyshyn , Andrian Piskozub
88-97
Abstract views: 466 | PDF Downloads: 347
DOI:
https://doi.org/10.28925/2663-4023.2020.10.8897
PDF (Українська)
APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM
Iryna Litvinchuk, Ruslan Korchomnyi , Nataliia Korshun , Maksym Vorokhob
98-112
Abstract views: 1490 | PDF Downloads: 609
DOI:
https://doi.org/10.28925/2663-4023.2020.10.98112
PDF (Українська)
MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS
Valeriy Lakhno, Andriy Blozva, Maksym Misiura , Dmytro Kasatkin , Borys Gusev
113-122
Abstract views: 530 | PDF Downloads: 246
DOI:
https://doi.org/10.28925/2663-4023.2020.10.113122
PDF (Українська)
THE IMPROVEMENT OF NTRUENCRYPT PUBLIC KEY CRYPTOSYSTEM: DESIGN AND PERFORMANCE EVALUATION
Anna Ilyenko , Sergii Ilyenko , Olena Prokopenko
123-134
Abstract views: 390 | PDF Downloads: 236
DOI:
https://doi.org/10.28925/2663-4023.2020.10.123134
PDF
METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY
Iryna Litvinchuk, Nataliia Korshun , Maksym Vorokhob
135-143
Abstract views: 413 | PDF Downloads: 323
DOI:
https://doi.org/10.28925/2663-4023.2020.10.135143
PDF (Українська)
ORGANIZATION OF PROTECTION OF KNOWLEDGE CONTROL RESULTS IN DISTANCE LEARNING SYSTEMS
Oleh Harasymchuk, Ivan Opirskyy, Yaroslav Sovyn, Ivan Tyshyk, Yevhenij Shtefaniuk
144-157
Abstract views: 353 | PDF Downloads: 312
DOI:
https://doi.org/10.28925/2663-4023.2020.10.144157
PDF (Українська)
CONDUCTING A SWOT-ANALYSIS OF INFORMATION RISK ASSESSMENT AS A MEANS OF FORMATION OF PRACTICAL SKILLS OF STUDENTS SPECIALTY 125 CYBER SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva , Pavlo Skladannyi
158-168
Abstract views: 1188 | PDF Downloads: 619
DOI:
https://doi.org/10.28925/2663-4023.2020.10.158168
PDF (Українська)
CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES
Serhii Tolіupa , Oleksandr Pliushch , Ivan Parkhomenko
169-183
Abstract views: 800 | PDF Downloads: 536
DOI:
https://doi.org/10.28925/2663-4023.2020.10.169183
PDF (Українська)
WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
Sergiy Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
184-196
Abstract views: 531 | PDF Downloads: 351
DOI:
https://doi.org/10.28925/2663-4023.2020.10.184196
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue