Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 14 (2021): Cybersecurity: Education, Science, Technique
Vol. 2 No. 14 (2021): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2021.14
Published:
2021-12-30
Content
Contents
4-5
Abstract views: 131 | PDF Downloads: 35
PDF (Українська)
Articles
POTENTIAL DISGUISING ATTACK VECTORS ON SECURITY OPERATION CENTERS AND SIEM SYSTEMS
Roman Drahuntsov , Dmytro Rabchun
6-16
Abstract views: 374 | PDF Downloads: 336
DOI:
https://doi.org/10.28925/2663-4023.2021.14.614
PDF
ALGORITHM FOR DETERMINING THE MEASURE OF EXISTENCE OF UNRELIABLE INFORMATION IN THE CONDITIONS OF INFORMATION CONFLICT
Tetiana Laptievа
15-25
Abstract views: 246 | PDF Downloads: 263
DOI:
https://doi.org/10.28925/2663-4023.2021.14.1525
PDF (Українська)
USE OF DEVSECOPS APPROACH FOR INFORMATION SECURITY THREATS ANALYSIS
Vitalii Susukailo
26-35
Abstract views: 325 | PDF Downloads: 181
DOI:
https://doi.org/10.28925/2663-4023.2021.14.2635
PDF (Українська)
METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR
Volodymyr Akhramovich
36-49
Abstract views: 247 | PDF Downloads: 173
DOI:
https://doi.org/10.28925/2663-4023.2021.14.3649
PDF (Українська)
METHOD OF MARKETPLACE LEGITIMATE USER AND ATTACKER PROFILING
Diana Tsyrkaniuk, Volodymyr Sokolov, Nataliia Mazur, Valerii Kozachok, Volodymyr Astapenya
50-67
Abstract views: 546 | PDF Downloads: 278
DOI:
https://doi.org/10.28925/2663-4023.2021.14.5067
PDF (Українська)
EXPERIMENTAL DETERMINATION OF OPTIMAL PARAMETERS OF MOBILE TELECONFERENCES
Andrii Byts, Volodymyr Sokolov, Nataliia Mazur, Valerii Kozachok, Anatoly Bessalov
68-86
Abstract views: 353 | PDF Downloads: 174
DOI:
https://doi.org/10.28925/2663-4023.2021.14.6886
PDF (Українська)
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS
Vitaliy Chubaievskyi, Valery Lakhno, Berik Akhmetov, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, Taras Litovchenko
87-99
Abstract views: 388 | PDF Downloads: 179
DOI:
https://doi.org/10.28925/2663-4023.2021.14.8799
PDF (Українська)
FORMS OF ELECTRONIC SIGNATURE AND FEATURES OF ITS USE IN SECURED INFORMATION SYSTEMS
Svitlana Palamarchuk, Natalia Palamarchuk, Vladimir Tkach, Olga Shugaly
100-106
Abstract views: 376 | PDF Downloads: 275
DOI:
https://doi.org/10.28925/2663-4023.2021.14.100106
PDF (Українська)
PROSPECTIVE METHODS OF PROTECTING THE FRAMEWORK WEB APPLICATION ON THE GRADLE AUTOMATIC ASSEMBLY SYSTEM
Anna Ilyenko , Sergii Ilyenko, Tatiana Kulish
107-117
Abstract views: 287 | PDF Downloads: 161
DOI:
https://doi.org/10.28925/2663-4023.2021.14.107117
PDF
IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES
Liudmyla Hlynchuk, Tetiana Hryshanovych, Andrii Stupin
118-130
Abstract views: 566 | PDF Downloads: 405
DOI:
https://doi.org/10.28925/2663-4023.2021.14.118130
PDF (Українська)
EXPERIMENTAL STUDIES OF THE STAND OF SIMULATION MODELING OF LASER MICROPHONE OPERATION FOR REMOVAL OF ACOUSTIC INFORMATION
Maksym Martseniuk, Pavlo Skladannyi, Volodymyr Astapenya
131-147
Abstract views: 510 | PDF Downloads: 188
DOI:
https://doi.org/10.28925/2663-4023.2021.14.131147
PDF (Українська)
RULES FOR THE IMPLEMENTATION OF EXPLOITS DURING AN ACTIVE ANALYSIS OF THE CORPORATE NETWORKS` SECURITY BASED ON A FUZZY ASSESSMENT OF THE QUALITY OF THE VULNERABILITY VALIDATION MECHANISM
Roman Kyrychok, Zoreslava Brzhevska, Hennadii Hulak, Anatoly Bessalov, Volodymyr Astapenya
148-157
Abstract views: 540 | PDF Downloads: 195
DOI:
https://doi.org/10.28925/2663-4023.2021.14.148157
PDF (Українська)
INFORMATION PROTECTION MODEL BASED ON INFORMATION SECURITY RISK ASSESSMENT FOR SMALL AND MEDIUM-SIZED BUSINESS
Svitlana Shevchenko, Yuliia Zhdanovа, Kateryna Kravchuk
158-175
Abstract views: 616 | PDF Downloads: 276
DOI:
https://doi.org/10.28925/2663-4023.2021.14.158175
PDF (Українська)
IMPROVED MODULE FOR DATA CRYPTOGRAPHIC SECURITY IN MODERN INFORMATION-COMMUNICATION SYSTEMS AND NETWORKS
Sergiy Gnatyuk, Tetiana Smirnova, Rat Berdibayev, Yuliia Burmak, Dinara Ospanova
176-185
Abstract views: 417 | PDF Downloads: 155
DOI:
https://doi.org/10.28925/2663-4023.2021.14.176185
PDF (Українська)
ANALYSIS AND DESIGN OF DISTRIBUTED SYSTEMS BASED ON CLUSTER TECHNOLOGIES
Victor Grechaninov
186-191
Abstract views: 248 | PDF Downloads: 153
DOI:
https://doi.org/10.28925/2663-4023.2021.14.186191
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue