Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 17 (2022): Cybersecurity: Education, Science, Technique
Vol. 1 No. 17 (2022): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2022.17
Published:
2022-09-29
Title
Title
1-3
Abstract views: 536 | PDF Downloads: 216
PDF (Українська)
Content
Contents
4-5
Abstract views: 514 | PDF Downloads: 153
PDF (Українська)
Articles
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM
Valerii Lakhno, Volodimir Maliukov, Larysa Komarova, Dmytro Kasatkin, Tetiana Osypova, Yehor Chasnovskyi
6-20
Abstract views: 1024 | PDF Downloads: 379
DOI:
https://doi.org/10.28925/2663-4023.2022.17.620
PDF (Українська)
THE POTENTIAL OF VARIOUS ARTIFICIAL INTELLIGENCE METHODS APPLICATION IN THE PROBLEM OF DRAWING RECOGNITION AND 2D 3D TRANSFORMATION
Karyna Khorolska
21-30
Abstract views: 770 | PDF Downloads: 413
DOI:
https://doi.org/10.28925/2663-4023.2022.17.2130
PDF (Українська)
ВДОСКОНАЛЕННЯ КІБЕРЗАХИСТУ ЗБРОЙНИХ СИЛ З УРАХУВАННЯМ ДОСВІДУ ПРОТИДІЇ ВІЙСЬКОВИМ КІБЕРОБЕРАЦІЯМ РОСІЙСЬКОЇ ФЕДЕРАЦІЇ В 2022 РОЦІ
Oleksii Baidur
31-45
Abstract views: 723 | PDF Downloads: 714
DOI:
https://doi.org/10.28925/2663-4023.2022.17.3145
PDF (Українська)
PROSPECTIVE DIRECTIONS OF TRAFFIC ANALYSIS AND INTRUSION DETECTION BASED ON NEURAL NETWORKS
Anna Ilyenko , Sergii Ilyenko , Iryna Kravchuk, Marharyta Herasymenko
46-56
Abstract views: 897 | PDF Downloads: 393
DOI:
https://doi.org/10.28925/2663-4023.2022.17.4656
PDF
MODERN APPROACHES TO PROVIDING CYBER SECURITY IN RADIO RELAY COMMUNICATION LINES
Vitalii Oleksenko , Roman Shtonda, Yuliya Chernish, Irina Maltseva
57-64
Abstract views: 801 | PDF Downloads: 482
DOI:
https://doi.org/10.28925/2663-4023.2022.17.5764
PDF (Українська)
ALGORITHM FOR CONNECTING ONLINE PAYMENT SERVICES FONDY, LIQPAY AND THEIR IMPLEMENTATION
Andrii Stupin, Liudmyla Hlynchuk, Tetiana Hryshanovych
6575
Abstract views: 602 | PDF Downloads: 379
DOI:
https://doi.org/10.28925/2663-4023.2022.17.6575
PDF (Українська)
ABOUT THE CYBERSECURITY OF MILITARY PERSONNEL PLAYING GEOLOCATION GAMES WHILE STAYING AT DEPARTMENTAL CRITICAL INFORMATION INFRASTRUCTURE FACILITIES
Lesya Kozubtsova, Igor Kozubtsov, Tetiana Tereshchenko, Tetiana Bondarenko
76-90
Abstract views: 1152 | PDF Downloads: 359
DOI:
https://doi.org/10.28925/2663-4023.2022.17.7690
PDF (Українська)
RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR
Illia Laktionov, Andrii Kmit, Ivan Opirskyy, Oleh Harasymchuk
91-111
Abstract views: 974 | PDF Downloads: 755
DOI:
https://doi.org/10.28925/2663-4023.2022.17.91111
PDF (Українська)
CLOUD TECHNOLOGIES IN LEARNING: ONTOLOGICAL APPROACH
Olha Tkachenko, Kostiantyn Tkachenko, Oleksandr Tkachenko
112-127
Abstract views: 552 | PDF Downloads: 350
DOI:
https://doi.org/10.28925/2663-4023.2022.17.112127
PDF
RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES
Anatoliy Bessalov, Ludmila Kovalchuk, Sergey Abramov
128-144
Abstract views: 556 | PDF Downloads: 419
DOI:
https://doi.org/10.28925/2663-4023.2022.17.128144
PDF (Українська)
VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS
Hennadii Hulak, Yuliia Zhdanovа, Pavlo Skladannyi, Yevhen Hulak, Viktor Korniiets
145-158
Abstract views: 1253 | PDF Downloads: 416
DOI:
https://doi.org/10.28925/2663-4023.2022.17.145158
PDF (Українська)
DEVELOPMENT OF RECOMMENDATIONS FOR REDUCING CYBER THREATS DURING REMOTE WORK FROM THE POINT OF VIEW OF CYBER SECURITY
Iryna Pazynina, Ruslan Korchomnyi
159-166
Abstract views: 886 | PDF Downloads: 520
DOI:
https://doi.org/10.28925/2663-4023.2022.17.159166
PDF (Українська)
ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV
Sergiy Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, Olena Nechyporuk, Bohdan Horbakha
167-186
Abstract views: 942 | PDF Downloads: 993
DOI:
https://doi.org/10.28925/2663-4023.2022.17.167186
PDF (Українська)
INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA
Yuriy Holovan, Anatoly Kurilo
187-197
Abstract views: 610 | PDF Downloads: 293
DOI:
https://doi.org/10.28925/2663-4023.2022.17.187197
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue