Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 21 (2023): Cybersecurity: Education, Science, Technique
Vol. 1 No. 21 (2023): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2023.21
Published:
2023-09-28
Title
Title
PDF (Українська)
Articles
ADMINISTRATIVE AND LEGAL BASIS FOR AUTHORIZING SECURITY AND DEFENSE SECTOR BODIES TO ORGANIZE CYBER TO INTELLIGENCE ACTIVITIES
Oleksandr Ponomarov, Lesya Kozubtsova, Ihor Kozubtsov, Volodymyr Tkach
6-16
Abstract views: 367 | PDF Downloads: 270
DOI:
https://doi.org/10.28925/2663-4023.2023.21.616
PDF (Українська)
PRACTICAL APPROACHES TO CYBER PROTECTION OF MOBILE DEVICES WITH THE HELP OF A SOLUTION ENDPOINT DETECTION AND RESPONSE
Roman Shtonda, Yuliya Chernish, Irina Maltseva, Yurii Tsykalo, Yevhen Chaika, Serhiy Polishchuk
17-31
Abstract views: 435 | PDF Downloads: 259
DOI:
https://doi.org/10.28925/2663-4023.2023.21.1731
PDF (Українська)
USING ELEMENTS OF GAMIFICATION IN INTELLIGENT LEARNING SYSTEMS: ONTOLOGICAL ASPECT
Kostiantyn Tkachenko, Olha Tkachenko, Oleksandr Tkachenko
32-47
Abstract views: 261 | PDF Downloads: 127
DOI:
https://doi.org/10.28925/2663-4023.2023.21.3247
PDF
ELLIPTIC CURVE CRYPTOGRAPHY AND ITS PRACTICAL APPLICATION
Nataliia Shchur, Oleksandra Pokotylo, Yelyzaveta Bailiuk
48-64
Abstract views: 552 | PDF Downloads: 640
DOI:
https://doi.org/10.28925/2663-4023.2023.21.4864
PDF (Українська)
MULTIPLE EFFECTIVENESS CRITERIA OF FORMING DATABASES OF EMOTIONAL VOICE SIGNALS
Ivan Dychka, Ihor Tereikovskyi , Andrii Samofalov, Lyudmila Tereykovska, Vitaliy Romankevich
65-74
Abstract views: 198 | PDF Downloads: 106
DOI:
https://doi.org/10.28925/2663-4023.2023.21.6574
PDF (Українська)
COGNITIVE MODELING OF INTELLECTUAL SYSTEMS OF ANALYSIS OF THE FINANCIAL CONDITION OF THE ENTITY
Ihor Karpunin, Nadiia Zinchenko
75-85
Abstract views: 286 | PDF Downloads: 126
DOI:
https://doi.org/10.28925/2663-4023.2023.21.7585
PDF (Українська)
A PERFORMANCE COMPARISON OF SORTING ALGORITHMS IN DIFFERENT PROGRAMMING LANGUAGES
Olena Trofymenko, Yuliia Prokop, Olena Chepurna, Mykola Korniichuk
86-98
Abstract views: 338 | PDF Downloads: 256
DOI:
https://doi.org/10.28925/2663-4023.2023.21.8698
PDF (Українська)
METHODOLOGY FOR ASSESSING COMPREHENSIVE DAMAGES FROM AN INFORMATION SECURITY INCIDENT
Volodymyr Sokolov, Pavlo Skladannyi
99-120
Abstract views: 492 | PDF Downloads: 277
DOI:
https://doi.org/10.28925/2663-4023.2023.21.99120
PDF (Українська)
MODELING OF THE INFORMATION INFRASTRUCTURE OF THE HIGH SCHOOL
Yaroslav Shestak, Vitaliy Chubaievskyi
121-135
Abstract views: 289 | PDF Downloads: 134
DOI:
https://doi.org/10.28925/2663-4023.2023.21.121135
PDF (Українська)
ANALYSIS AND EVALUATION OF BIOMETRIC AUTHENTICATION MEANS BASED ON THE IMAGE OF THE FACE AND IRIS OF THE STAFF OF CRITICAL INFRASTRUCTURE FACILITIES
Oleksandr Korchenko, Oleh Tereikovskyi
136-148
Abstract views: 271 | PDF Downloads: 114
DOI:
https://doi.org/10.28925/2663-4023.2023.21.136148
PDF (Українська)
DATA PROTECTION AT THE STAGES OF ITS FUNCTIONING
Volodymyr Akhramovych
149-161
Abstract views: 186 | PDF Downloads: 169
DOI:
https://doi.org/10.28925/2663-4023.2023.21.149161
PDF (Українська)
SYNERGIC APPROACH BASED ASSESSMENT OF BUSINESS-PROCESSES CONTINUITY
Nataliia Zviertseva
162-176
Abstract views: 191 | PDF Downloads: 93
DOI:
https://doi.org/10.28925/2663-4023.2023.21.162176
PDF
A NEURO-GAME MODEL OF STRATEGY ANALYSIS DURING THE DYNAMIC INTERACTION OF PHISHING ATTACK PARTICIPANTS
Valery Lakhno, Miroslav Lakhno, Olena Kryvoruchko, Alona Desiatko, Vitaliy Chubaievskyi, Bakhytzhan Akhmetov, Madina Bereke
177-192
Abstract views: 381 | PDF Downloads: 123
DOI:
https://doi.org/10.28925/2663-4023.2023.21.177192
PDF (Українська)
DEVELOPMENT OF SECURE CONTAINERIZED APPLICATIONS WITH A MICROSERVICES ARCHITECTURE
Svitlana Spasiteleva, Ivan Chychkan, Svitlana Shevchenko, Yulia Zhdanovа
193-210
Abstract views: 339 | PDF Downloads: 147
DOI:
https://doi.org/10.28925/2663-4023.2023.21.193210
PDF (Українська)
ONTOLOGICAL MODELING OF INFORMATION DATA OF DIGITAL CRIMINAL CRIME
Lidiia Vlasenko, Nataliia Lutska, Tetiana Savchenko, Oleksandr Bohdanov
211-222
Abstract views: 284 | PDF Downloads: 126
DOI:
https://doi.org/10.28925/2663-4023.2023.21.211222
PDF (Українська)
MODERN PERSPECTIVES OF APPLYING THE CONCEPT OF ZERO TRUST IN BUILDING A CORPORATE INFORMATION SECURITY POLICY
Maksym Vorokhob, Roman Kyrychok, Vladyslav Yaskevych, Yurii Dobryshyn, Serhii Sydorenko
223-233
Abstract views: 556 | PDF Downloads: 239
DOI:
https://doi.org/10.28925/2663-4023.2023.21.223233
PDF (Українська)
DETECTION OF NETWORK INTRUSIONS USING MACHINE LEARNING ALGORITHMS AND FUZZY LOGIC
Yevhen Chychkarov, Olga Zinchenko, Andriy Bondarchuk, Liudmyla Aseeva
234-251
Abstract views: 268 | PDF Downloads: 118
DOI:
https://doi.org/10.28925/2663-4023.2023.21.234251
PDF (Українська)
HOLOGRAPHIC 3D WINDOWS AS A MEANS OF VISUALIZING SIMULATION MODELS
Oleg Pursky, Volodymir Gamaliy
252-259
Abstract views: 157 | PDF Downloads: 81
DOI:
https://doi.org/10.28925/2663-4023.2023.21.252259
PDF (Українська)
DATA REPRESENTATION MODEL FOR A RECOMMENDATION SYSTEM IN THE EDUCATION FIELD BASED ON FUZZY LOGIC
Bogdan Khudik
260-272
Abstract views: 235 | PDF Downloads: 114
DOI:
https://doi.org/10.28925/2663-4023.2032.21.260272
PDF (Українська)
PERFORMANCE EVALUATION OF LIGHTWEIGHT CRYPTOGRAPHY ALGORITHMS ON CONSTRAINED 8-BIT DEVICES
Roman Chernenko
Abstract views: 187 | PDF Downloads: 74
DOI:
https://doi.org/10.28925/2663-4023.2023.21.273285
PDF (Українська)
AN INTEGRATED APPROACH TO CYBERSECURITY AND CYBERCRIME INVESTIGATION OF CRITICAL INFRASTRUCTURE THROUGH A RANSOMWARE INCIDENT MONITORING SYSTEM
Oleh Harasymchuk, Andrii Partyka, Elena Nyemkova, Yaroslav Sovyn
286-296
Abstract views: 249 | PDF Downloads: 221
DOI:
https://doi.org/10.28925/2663-4023.2023.21.286296
PDF (Українська)
METHOD OF ASSESSING THE EFFICIENCY OF ENSURING INFORMATION SECURITY OF THE EDUCATIONAL INFORMATION SYSTEM
Oleksiy Ananchenko
297-308
Abstract views: 202 | PDF Downloads: 44
DOI:
https://doi.org/10.28925/2663-4023.2023.21.297308
PDF (Українська)
ADAPTATION OF THE KURAMOTO MODEL FOR THE ANALYSIS OF THE DISTRIBUTION OF INFORMATION IN SOCIAL NETWORKS
Kateryna Dmytriienko
309-314
Abstract views: 69 | PDF Downloads: 23
DOI:
https://doi.org/10.28925/2663-4023.2023.21.309314
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue