Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 17 (2022): Cybersecurity: Education, Science, Technique
Vol. 1 No. 17 (2022): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2022.17
Published:
2022-09-29
Title
Title
1-3
Abstract views: 182 | PDF Downloads: 101
PDF (Українська)
Content
Contents
4-5
Abstract views: 133 | PDF Downloads: 48
PDF (Українська)
Articles
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM
Valerii Lakhno, Volodimir Maliukov, Larysa Komarova, Dmytro Kasatkin, Tetiana Osypova, Yehor Chasnovskyi
6-20
Abstract views: 535 | PDF Downloads: 220
DOI:
https://doi.org/10.28925/2663-4023.2022.17.620
PDF (Українська)
THE POTENTIAL OF VARIOUS ARTIFICIAL INTELLIGENCE METHODS APPLICATION IN THE PROBLEM OF DRAWING RECOGNITION AND 2D 3D TRANSFORMATION
Karyna Khorolska
21-30
Abstract views: 446 | PDF Downloads: 220
DOI:
https://doi.org/10.28925/2663-4023.2022.17.2130
PDF (Українська)
ВДОСКОНАЛЕННЯ КІБЕРЗАХИСТУ ЗБРОЙНИХ СИЛ З УРАХУВАННЯМ ДОСВІДУ ПРОТИДІЇ ВІЙСЬКОВИМ КІБЕРОБЕРАЦІЯМ РОСІЙСЬКОЇ ФЕДЕРАЦІЇ В 2022 РОЦІ
Oleksii Baidur
31-45
Abstract views: 353 | PDF Downloads: 425
DOI:
https://doi.org/10.28925/2663-4023.2022.17.3145
PDF (Українська)
PROSPECTIVE DIRECTIONS OF TRAFFIC ANALYSIS AND INTRUSION DETECTION BASED ON NEURAL NETWORKS
Anna Ilyenko , Sergii Ilyenko , Iryna Kravchuk, Marharyta Herasymenko
46-56
Abstract views: 388 | PDF Downloads: 195
DOI:
https://doi.org/10.28925/2663-4023.2022.17.4656
PDF
MODERN APPROACHES TO PROVIDING CYBER SECURITY IN RADIO RELAY COMMUNICATION LINES
Vitalii Oleksenko , Roman Shtonda, Yuliya Chernish, Irina Maltseva
57-64
Abstract views: 303 | PDF Downloads: 240
DOI:
https://doi.org/10.28925/2663-4023.2022.17.5764
PDF (Українська)
ALGORITHM FOR CONNECTING ONLINE PAYMENT SERVICES FONDY, LIQPAY AND THEIR IMPLEMENTATION
Andrii Stupin, Liudmyla Hlynchuk, Tetiana Hryshanovych
6575
Abstract views: 309 | PDF Downloads: 221
DOI:
https://doi.org/10.28925/2663-4023.2022.17.6575
PDF (Українська)
ABOUT THE CYBERSECURITY OF MILITARY PERSONNEL PLAYING GEOLOCATION GAMES WHILE STAYING AT DEPARTMENTAL CRITICAL INFORMATION INFRASTRUCTURE FACILITIES
Lesya Kozubtsova, Igor Kozubtsov, Tetiana Tereshchenko, Tetiana Bondarenko
76-90
Abstract views: 716 | PDF Downloads: 187
DOI:
https://doi.org/10.28925/2663-4023.2022.17.7690
PDF (Українська)
RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR
Illia Laktionov, Andrii Kmit, Ivan Opirskyy, Oleh Harasymchuk
91-111
Abstract views: 457 | PDF Downloads: 420
DOI:
https://doi.org/10.28925/2663-4023.2022.17.91111
PDF (Українська)
CLOUD TECHNOLOGIES IN LEARNING: ONTOLOGICAL APPROACH
Olha Tkachenko, Kostiantyn Tkachenko, Oleksandr Tkachenko
112-127
Abstract views: 303 | PDF Downloads: 161
DOI:
https://doi.org/10.28925/2663-4023.2022.17.112127
PDF
RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES
Anatoliy Bessalov, Ludmila Kovalchuk, Sergey Abramov
128-144
Abstract views: 276 | PDF Downloads: 206
DOI:
https://doi.org/10.28925/2663-4023.2022.17.128144
PDF (Українська)
VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS
Hennadii Hulak, Yuliia Zhdanovа, Pavlo Skladannyi, Yevhen Hulak, Viktor Korniiets
145-158
Abstract views: 505 | PDF Downloads: 201
DOI:
https://doi.org/10.28925/2663-4023.2022.17.145158
PDF (Українська)
DEVELOPMENT OF RECOMMENDATIONS FOR REDUCING CYBER THREATS DURING REMOTE WORK FROM THE POINT OF VIEW OF CYBER SECURITY
Iryna Pazynina, Ruslan Korchomnyi
159-166
Abstract views: 546 | PDF Downloads: 318
DOI:
https://doi.org/10.28925/2663-4023.2022.17.159166
PDF (Українська)
ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV
Sergiy Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, Olena Nechyporuk, Bohdan Horbakha
167-186
Abstract views: 477 | PDF Downloads: 657
DOI:
https://doi.org/10.28925/2663-4023.2022.17.167186
PDF (Українська)
INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA
Yuriy Holovan, Anatoly Kurilo
187-197
Abstract views: 239 | PDF Downloads: 125
DOI:
https://doi.org/10.28925/2663-4023.2022.17.187197
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue