Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 18 (2022): Cybersecurity: Education, Science, Technique
Vol. 2 No. 18 (2022): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2022.18
Published:
2023-05-01
Title
Title
1-3
Abstract views: 164 | PDF Downloads: 98
PDF (Українська)
Articles
THE MODEL OF SERVER VIRTUALIZATION SYSTEM PROTECTION IN THE EDUCATIONAL INSTITUTION LOCAL NETWORK
Valery Lakhno, Kalaman Yerbolat, Yagaliyeva Bagdat, Olena Kryvoruchko, Alona Desiatko, Svitlana Tsiutsiura, Mykola Tsiutsiura
6-23
Abstract views: 4144 | PDF Downloads: 532
DOI:
https://doi.org/10.28925/2663-4023.2022.18.623
PDF (Українська)
PROCEDURE FOR USING NEURAL NETWORKS FOR SEGMENTATION OF RASTER IMAGES
Ihor Tereikovskyi, Denys Chernyshev, Oleksandr Korchenko, Liudmyla Tereikovska, Oleh Tereikovskyi
24-38
Abstract views: 274 | PDF Downloads: 255
DOI:
https://doi.org/10.28925/2663-4023.2022.18.2438
PDF (Українська)
TESTING THE ORGANIZATION'S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS
Ivan Tyshyk
39-48
Abstract views: 270 | PDF Downloads: 236
DOI:
https://doi.org/10.28925/2663-4023.2022.18.3948
PDF (Українська)
CONCEPT OF A TRAINING COMPLEX FOR TRAINING MILITARY INFORMATION AND CYBERSECURITY SPECIALISTS BASED ON A COMPUTER GAME (GAMIFICATION)
Lesya Kozubtsova, Igor Kozubtsov, Valery Lishchina, Serhii Shtanenko
49-60
Abstract views: 256 | PDF Downloads: 223
DOI:
https://doi.org/10.28925/2663-4023.2022.18.4960
PDF (Українська)
OUTLINE OF THE FUNCTIONAL PURPOSE, REQUIREMENTS FOR THE COMPOSITION OF EQUIPMENT AND TOOLS FOR COMPLEX HARDWARE COMMUNICATION AND CYBERSECURITY
Oleksandr Shemendiuk, Igor Kozubtsov, Ivan Neshcheret, Yurii Protsiuk, Serhii Bryhadyr, Denys Fomkin
61-72
Abstract views: 561 | PDF Downloads: 314
DOI:
https://doi.org/10.28925/2663-4023.2022.18.6172
PDF (Українська)
MODEL OF INDICATORS FOR THE ASSESSMENT OF THE NATIONAL LEVEL OF DIGITALIZATION AND CYBER SECURITY OF THE COUNTRIES OF THE WORLD
Natalia Barchenko, Volodymyr Lubchak, Tetiana Lavryk
73-85
Abstract views: 251 | PDF Downloads: 621
DOI:
https://doi.org/10.28925/2663-4023.2022.18.7385
PDF (Українська)
DETECTION OF FAKE ACCOUNTS IN SOCIAL MEDIA
Olesia Voitovych, Leonid Kupershtein, Vitalii Holovenko
86-98
Abstract views: 394 | PDF Downloads: 275
DOI:
https://doi.org/10.28925/2663-4023.2022.18.8698
PDF
REAL SIMULATION OF A "WAR DRIVING" ATTACK ON A WIRELESS NETWORK
Roman Korolkov, Serhii Laptiev
99-107
Abstract views: 221 | PDF Downloads: 165
DOI:
https://doi.org/10.28925/2663-4023.2022.18.99107
PDF (Українська)
THE METHOD OF DEVELOPING A CLASSIFIER USING THE BAYES THEOREM FOR MAKING A DECISION ON THE DETERMINATION OF TRUE INFORMATION
Nataliya Lukova-Chuiko, Tetiana Laptieva
108-123
Abstract views: 226 | PDF Downloads: 247
DOI:
https://doi.org/10.28925/2663-4023.2022.18.108123
PDF (Українська)
APPROACHES TO THE FORMATION OF SCIENTIFIC THINKING IN CYBERSECURITY HIGH SCHOOL STUDENTS
Volodymyr Sokolov
124-137
Abstract views: 295 | PDF Downloads: 149
DOI:
https://doi.org/10.28925/2663-4023.2022.18.124137
PDF (Українська)
INFORMATION TECHNOLOGY: APPROACHES TO DEFINITION, PRINCIPLES OF CONSTRUCTION
Valentyna Makoiedova
138-149
Abstract views: 418 | PDF Downloads: 603
DOI:
https://doi.org/10.28925/2663-4023.2022.18.138149
PDF (Українська)
STUDY OF APPLIED ASPECTS OF CONFLICT THEORY IN SECURITY SYSTEMS
Svitlana Shevchenko, Pavlo Skladannyi, Olena Nehodenko, Vitalii Nehodenko
150-162
Abstract views: 461 | PDF Downloads: 247
DOI:
https://doi.org/10.28925/2663-4023.2022.18.150162
PDF (Українська)
ANALYSIS OF DIGITAL CRYPTOCURRENCY MARKET FORECASTING METHODS AND MODELS
Bohdan Bebeshko
163-174
Abstract views: 284 | PDF Downloads: 273
DOI:
https://doi.org/10.28925/2663-4023.2022.18.163174
PDF (Українська)
DISINFORMATION AND FAKE NEWS: FEATURES AND METHODS OF DETECTION ON THE INTERNET
Vitalii Tyshchenko, Tetiana Muzhanova
175-186
Abstract views: 1419 | PDF Downloads: 1009
DOI:
https://doi.org/10.28925/2663-4023.2022.18.175186
PDF (Українська)
THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS
Igor Sukaylo, Nataliia Korshun
187-196
Abstract views: 369 | PDF Downloads: 254
DOI:
https://doi.org/10.28925/2663-4023.2022.18.187196
PDF (Українська)
METHODOLOGICAL ASPECTS OF DETERMINING THE PARAMETERS OF PROTECTIVE EFFECTS ON PROBING SIGNALS OF HIGH-FREQUENCY IMPOSITION
Larysa Kriuchkova, Ivan Tsmokanych
197-204
Abstract views: 220 | PDF Downloads: 69
DOI:
https://doi.org/10.28925/10.28925/2663-4023.2022.18.197204
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue