Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 15 (2022): Cybersecurity: Education, Science, Technique
Vol. 3 No. 15 (2022): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2022.15
Published:
2022-03-31
Title
Title
1-3
Abstract views: 229 | PDF Downloads: 91
PDF (Українська)
Content
Contents
PDF (Українська)
Contents
4-5
Abstract views: 122 | PDF Downloads: 22
PDF (Українська)
Articles
SYSTEM TO COLLECT INFORMATION WHEN TRANSFERRING DATA TO RADIO CHANNELS
Bohdan Zhurakovskyi, Oleksiy Nedashkivskiy
6-34
Abstract views: 590 | PDF Downloads: 455
DOI:
https://doi.org/10.28925/2663-4023.2022.15.634
PDF (Українська)
DEVELOPMENT OF A METHOD FOR CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE CENTRALITY OF THE NETWORK
Volodymyr Akhramovich
35-52
Abstract views: 220 | PDF Downloads: 198
DOI:
https://doi.org/10.28925/2663-4023.2022.15.3552
PDF (Українська)
ANALYSIS OF FACTORS AFFECTING CYBER SECURITY OF A HIGHER MILITARY EDUCATIONAL INSTITUTION
Vladyslav Kyva
53-70
Abstract views: 623 | PDF Downloads: 512
DOI:
https://doi.org/10.28925/2663-4023.2022.15.5370
PDF (Українська)
ANALYSIS OF OS WINDOWS 10 FILE OBJECTS FOR SYSTEM PARTITION SPACE CLEANING AND OPTIMIZATION
Vitalii Bulatetskyi, Lesia Bulatetska, Tetiana Hryshanovych
71-84
Abstract views: 352 | PDF Downloads: 319
DOI:
https://doi.org/10.28925/2663-4023.2022.15.7184
PDF (Українська)
INVESTIGATION OF LINEAR TRANSFORMATIONS OF THE PROPOSED HUSHING FUNCTION OF THE ADVANCED MODULE OF CRYPTOGRAPHIC PROTECTION IN INFORMATION AND CIRCUMSTANCES
Tetiana Smirnova, Nataliia Yakymenko, Oleksandr Ulichev, Oksana Konoplitska-Slobodeniuk, Serhii Smirnov
85-92
Abstract views: 229 | PDF Downloads: 198
DOI:
https://doi.org/10.28925/2663-4023.2022.15.8592
PDF (Українська)
TOOLS OF IMPROVING THE DIGITAL COMPETENCE LEVEL OF CYBER SECURITY PROFESSIONALS IN THE EDUCATIONAL PROCESS
Leonid Arsenovych
93-109
Abstract views: 473 | PDF Downloads: 701
DOI:
https://doi.org/10.28925/2663-4023.2022.15.93109
PDF (Українська)
RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS
Valery Dudykevych, Ivan Opirskyy, Nazariy Dzianyi , Larysa Rakobovchuk, Petro Garanyuk
110-123
Abstract views: 427 | PDF Downloads: 369
DOI:
https://doi.org/10.28925/2663-4023.2022.15.110123
PDF (Українська)
FUNCTIONS OF THE INFORMATION SECURITY AND CYBERSECURITY SYSTEM OF CRITICAL INFORMATION INFRASTRUCTURE
Yuri Khlaponin, Lesya Kozubtsova, Igor Kozubtsov, Roman Shtonda
124-134
Abstract views: 908 | PDF Downloads: 574
DOI:
https://doi.org/10.28925/2663-4023.2022.15.1241341
PDF (Українська)
MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT USING PETRI NETS
Valerii Lakhno, Victor Smolii , Andrii Blozva, Dmytro Kasatkin, Tetiana Osypova, Maksym Misiura
135-147
Abstract views: 321 | PDF Downloads: 225
DOI:
https://doi.org/10.28925/2663-4023.2022.15.135147
PDF (Українська)
HOW TO CONSTRUCT CSIDH ON QUADRATIC AND TWISTED EDWARDS CURVES
Anatoliy Bessalov
148-163
Abstract views: 243 | PDF Downloads: 199
DOI:
https://doi.org/10.28925/2663-4023.2022.15.148163
PDF
ASSESSMENT OF THE PRECONDITIONS OF FORMATION OF THE METHODOLOGY OF ASSESSMENT OF INFORMATION RELIABILITY
Zoreslava Brzhevska, Roman Kyrychok, Artem Platonenko, Hennadii Hulak
164-174
Abstract views: 607 | PDF Downloads: 235
DOI:
https://doi.org/10.28925/2663-4023.2022.15.164174
PDF (Українська)
INSIDERS AND INSIDER INFORMATION: ESSENCE, THREATS, ACTIVITIES AND LEGAL RESPONSIBILITY
Svitlana Shevchenko, Yuliia Zhdanovа, Pavlo Skladannyi, Sofia Boiko
175-185
Abstract views: 1384 | PDF Downloads: 706
DOI:
https://doi.org/10.28925/2663-4023.2022.15.175185
PDF (Українська)
DESIGNING A PROTECTED INFORMATION SYSTEM FOR PRODUCT CREATION IN ADAPTATION CONDITIONS
Mariia Nazarkevych, Hanna Nazarkevych
186-195
Abstract views: 247 | PDF Downloads: 192
DOI:
https://doi.org/10.28925/2663-4023.2022.15.186195
PDF (Українська)
BIOMETRICAL AUTHENTICATION SYSTEMS USING ELECTROENCEPHALOGRAPHY
Mahyar Taj Dini
196-215
Abstract views: 1552 | PDF Downloads: 157
DOI:
https://doi.org/10.28925/2663-4023.2022.15.196215
PDF
CRYPTOGRAPHY DATA ENCRYPTION METHOD PATTERN REVERSE MULTIPLICATION
Serhii Kulibaba, Oleg Kurchenko
216-223
Abstract views: 421 | PDF Downloads: 185
DOI:
https://doi.org/10.28925/2663-4023.2022.15.216223
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue