Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 4 No. 16 (2022): Cybersecurity: Education, Science, Technique
Vol. 4 No. 16 (2022): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2022.16
Published:
2022-06-30
Title
Title
PDF (Українська)
Content
Contents
4-5
Abstract views: 141 | PDF Downloads: 42
PDF (Українська)
Articles
EXPERIMENTAL STUDY OF THE MODEL FOR CALCULATING THE QUANTITATIVE CRITERIA FOR ASSESSING THE SECURITY LEVEL OF INFORMATION AND TELECOMMUNICATION SYSTEMS IN CRITICAL INFRASTRUCTURE OF THE STATE
Sergiy Gnatyuk, Oleksiy Yudin, Viktoriia Sydorenko, Tetiana Smirnova, Dauriya Zhaksigulova
6-18
Abstract views: 434 | PDF Downloads: 278
DOI:
https://doi.org/10.28925/2663-4023.2022.16.618
PDF (Українська)
SELECTION OF INDIVIDUAL INDICATORS FOR ASSESSING THE ABILITY OF THE INFORMATION SECURITY AND CYBERSECURITY SYSTEM TO FUNCTION IN SPECIAL COMMUNICATION INFORMATION AND COMMUNICATION SYSTEMS
Igor Kozubtsov, Oleksandr Chernonoh, Lesya Kozubtsova, Mykhailo Artemchuk, Ivan Neshcheret
19-27
Abstract views: 382 | PDF Downloads: 378
DOI:
https://doi.org/10.28925/2663-4023.2022.16.1927
PDF (Українська)
CYBERWAR AS A VARIETY OF INFORMATION WARS. UKRAINIAN CYBER SPACE PROTECTION
Yana Dmytruk , Tetiana Hryshanovych, Liudmyla Hlynchuk, Oksana Zhyharevych
28-36
Abstract views: 706 | PDF Downloads: 597
DOI:
https://doi.org/10.28925/2663-4023.2022.16.2836
PDF (Українська)
АНАЛІЗ ДЕЯКИХ КІБЕРЗАГРОЗ В УМОВАХ ВІЙНИ
Irina Maltseva, Yuliya Chernish, Roman Shtonda
37-44
Abstract views: 1582 | PDF Downloads: 858
DOI:
https://doi.org/10.28925/2663-4023.2022.16.3744
PDF (Українська)
THE ADVANCED METHOD OF PROTECTION OF PERSONAL DATA FROM ATTACKS USING SOCIAL ENGINEERING ALGORITHMS
Serhii Laptiev
45-62
Abstract views: 486 | PDF Downloads: 775
DOI:
https://doi.org/10.28925/2663-4023.2022.16.4562
PDF (Українська)
NUTRITION SELECTION SYSTEM ACCORDING TO HEALTH INDICATORS
Sofiia Shmaiun, Bohdan Zhurakovskyi, Yevhen Ivanichenko
63-75
Abstract views: 375 | PDF Downloads: 236
DOI:
https://doi.org/10.28925/2663-4023.2022.16.6375
PDF (Українська)
CYBERTHREATS IN HIGHER EDUCATION
Olena Trofymenko, Nataliia Loginova, Manakov Serhii, Yaroslav Dubovoi1
76-84
Abstract views: 636 | PDF Downloads: 597
DOI:
https://doi.org/10.28925/2663-4023.2022.16.7684
PDF (Українська)
PRESERVATION OF HIERARCHY STRUCTURES IN RELATIVE DATABASES
Volodymyr Markitan, Mykola Vozniak, Lesia Bulatetska , Vitalii Bulatetskyi
85-97
Abstract views: 248 | PDF Downloads: 210
DOI:
https://doi.org/10.28925/2663-4023.2022.16.8597
PDF (Українська)
COMPARATIVE ANALYSIS OF SOLUTIONS TO PROVIDE CONTROL AND MANAGEMENT OF PRIVILEGED ACCESS IN THE IT ENVIRONMENT
Oleksandr Romaniuk, Pavlo Skladannyi, Svitlana Shevchenko
98-112
Abstract views: 655 | PDF Downloads: 483
DOI:
https://doi.org/10.28925/2663-4023.2022.16.98112
PDF (Українська)
SMART CITY INFORMATION SYSTEM BASED ON LORA TECHNOLOGYANNOTATION
Olga Borkivska, Bohdan Zhurakovskyi , Artem Platonenko
113-128
Abstract views: 425 | PDF Downloads: 412
DOI:
https://doi.org/10.28925/2663-4023.2022.16.113128
PDF (Українська)
INTERNATIONAL VENDOR-NEUTRAL CERTIFICATION FOR INFORMATION SECURITY PROFESSIONALS
Tetiana Muzhanova, Yuriy Yakymenko , Mykhailo Zaporozhchenko , Vitalii Tyshchenko
129-141
Abstract views: 332 | PDF Downloads: 267
DOI:
https://doi.org/10.28925/2663-4023.2022.16.129141
PDF
EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES
Oleksandr Bushma, Andrii Turukalo
142-158
Abstract views: 205 | PDF Downloads: 130
DOI:
https://doi.org/10.28925/2663-4023.2022.16.142158
PDF (Українська)
ANALYSIS OF METHODS, METHODS, MECHANISMS, TOOLS THEORIES OF DECISION-MAKING FOR MODELING INFORMATION PROTECTION SYSTEM
Oleksandr Avtushenko, Vira Hyrda, Yuliia Kozhedub, Andrii Maksymets
159-171
Abstract views: 342 | PDF Downloads: 241
DOI:
https://doi.org/10.28925/2663-4023.2022.16.159171
PDF (Українська)
OPTIMIZATION OF THE METHOD OF CHOOSING THE INVESTMENT STRATEGY OF INFORMATION SECURITY EQUIPMENT BASED ON THE COMBINATION OF GAME THEORY AND THE GENETIC ALGORITHM
Liubov Plyska, Volodimir Maliukov
172-184
Abstract views: 309 | PDF Downloads: 101
DOI:
https://doi.org/10.28925/2663-4023.2022.16.172184
PDF
ANALYSIS OF THE MAIN METHODS OF DRAWINGS RECOGNITION AND THE POSSIBILITIES OF TRANSFORMATION 2D IN 3D
Karyna Khorolska
185-193
Abstract views: 317 | PDF Downloads: 256
DOI:
https://doi.org/10.28925/2663-4023.2022.16.185193
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue