Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 22 (2023): Cybersecurity: Education, Science, Technique
Vol. 2 No. 22 (2023): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2023.22
Published:
2023-12-28
Title
Title
PDF (Українська)
Articles
THREATS AND RISKS OF THE USE OF ARTIFICIAL INTELLIGENCE
Oleksii Skitsko, Pavlo Skladannyi, Roman Shyrshov, Mykhailo Humeniuk, Maksym Vorokhob
6-18
Abstract views: 2488 | PDF Downloads: 1139
DOI:
https://doi.org/10.28925/2663-4023.2023.22.618
PDF (Українська)
CONSTRUCTION OF AN IMPROVED ENCRYPTION SCHEME ON GENERALIZED SUZUKI 2-GROUPS IN THE MST3 CRYPTOSYSTEM
Yevgen Kotukh, Hennady Khalimov, Maksym Korobchynskyi
19-30
Abstract views: 270 | PDF Downloads: 149
DOI:
https://doi.org/10.28925/2663-4023.2023.22.1930
PDF (Українська)
THE METHOD OF EXCLUSION OF KNOWN SIGNALS WHEN SCANNING A SPECIFIED RADIO RANGE
Oleksandr Laptiev, Serhii Zozulia
31-38
Abstract views: 276 | PDF Downloads: 143
DOI:
https://doi.org/10.28925/2663-4023.2023.22.3138
PDF (Українська)
ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK
Vitalii Chubaievskyi, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, Kyrylo Synelnyk
39-53
Abstract views: 303 | PDF Downloads: 180
DOI:
https://doi.org/10.28925/2663-4023.2023.22.3953
PDF
ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM
Svitlana Lehominova, Halyna Haidur
54-67
Abstract views: 895 | PDF Downloads: 430
DOI:
https://doi.org/10.28925/2663-4023.2023.22.5467
PDF (Українська)
MODEL FOR CALCULATING THE COSTS OF A BUG BOUNTY PROGRAM FOR TESTING SECURITY VULNERABILITIES
Feodosiy Kipchuk, Volodymyr Sokolov
68-83
Abstract views: 368 | PDF Downloads: 169
DOI:
https://doi.org/10.28925/2663-4023.2023.22.6883
PDF (Українська)
METHOD OF LOW-RESOURCE HASHING TYPE "DATA – GENERATOR"
Vitalii Seleznov, Volodymyr Luzhetskyi
84-95
Abstract views: 260 | PDF Downloads: 196
DOI:
https://doi.org/10.28925/2663-4023.2023.22.8495
PDF (Українська)
ANALYSIS OF THE PROBLEMS OF USING EXISTING WEB VULNERABILITY STANDARDS
Petro Petriv, Ivan Opirskyy
96-112
Abstract views: 316 | PDF Downloads: 251
DOI:
https://doi.org/10.28925/2663-4023.2023.22.96112
PDF (Українська)
РОЗРОБКА МЕТОДИКИ ВИПРОБУВАНЬ БІБЛІОТЕКИ КРИПТОГРАФІЧНИХ ПЕРЕТВОРЮВАНЬ НА ПРИКЛАДІ КРИПТОСИСТЕМИ MST3 НА ОСНОВІ УЗАГАЛЬНЕНИХ СУЗУКІ 2-ГРУП
Yevgen Kotukh, Oleksandr Marukhnenko, Hennadii Khalimov, Maksym Korobchynskyi
113-121
Abstract views: 228 | PDF Downloads: 131
DOI:
https://doi.org/10.28925/2663-4023.2023.22.113121
PDF (Українська)
PRACTICAL APPROACHES TO ORGANIZING SECURE DATA TRANSFER VIA TLS PROTOCOL USING OPENSSL MEANS
Anna Ilyenko, Sergii Ilyenko, Olena Prokopenko, Iryna Kravchuk
122-133
Abstract views: 269 | PDF Downloads: 158
DOI:
https://doi.org/10.28925/2663-4023.2023.22.122133
PDF
SELF-DIAGNOSIS AS A WAY TO INCREASE THE CYBER RESISTANCE OF TERMINAL COMPONENTS OF A TECHNOLOGICAL SYSTEM
Serhii Toliupa, Yurii Samokhvalov, Pavlo Khusainov, Serhii Shtanenko
134-147
Abstract views: 286 | PDF Downloads: 158
DOI:
https://doi.org/10.28925/2663-4023.2023.22.134147
PDF (Українська)
ANALYSIS OF METHODS FOR DETECTING MISINFORMATION IN SOCIAL NETWORKS USING MACHINE LEARNING
Maksym Martseniuk, Valerii Kozachok, Oleksandr Bohdanov, Ievgen Iosifov, Zoreslava Brzhevska
148-155
Abstract views: 1056 | PDF Downloads: 49
DOI:
https://doi.org/10.28925/2663-4023.2023.22.148155
PDF (Українська)
RESEARCH OF DEVELOPMENT AND INNOVATION OF CYBER PROTECTION AT CRITICAL INFRASTRUCTURE FACILITIES
Yana Mashtaliar, Valerii Kozachok, Zoreslava Brzhevska, Oleksandr Bohdanov, Iryna Oksanych, Валерій Литвинов
156-167
Abstract views: 781 | PDF Downloads: 78
DOI:
https://doi.org/10.28925/2663-4023.2023.22.156167
PDF (Українська)
GAME THEORETICAL APPROACH TO THE MODELING OF CONFLICTS IN INFORMATION SECURITY SYSTEMS
Svitlana Shevchenko, Yuliia Zhdanovа, Pavlo Skladannyi, Sofia Boiko
168-178
Abstract views: 437 | PDF Downloads: 213
DOI:
https://doi.org/10.28925/2663-4023.2023.22.168178
PDF (Українська)
ZERO TRUST CONCEPT FOR ACTIVE DIRECTORY PROTECTION TO DETECT RANSOMWARE
Danyil Zhuravchak, Pavlo Hlushchenko, Maksym Opanovych, Valerii Dudykevych, Andrian Piskozub
179-190
Abstract views: 346 | PDF Downloads: 206
DOI:
https://doi.org/10.28925/2663-4023.2023.22.179190
PDF (Українська)
GENERATION OF PSEUDORANDOM SEQUENCES ON MICROCONTROLLERS WITH LIMITED COMPUTATIONAL RESOURCES, ENTROPY SOURCES, AND STATISTICAL PROPERTIES TESTING
Roman Chernenko
191-203
Abstract views: 324 | PDF Downloads: 175
DOI:
https://doi.org/10.28925/2663-4023.2023.22.191203
PDF (Українська)
MODEL OF IMPLEMENTATION OF ELECTRONIC COMMERCE TECHNOLOGIES
Oleksandr Kharchenko, Valentyn Yaremych
204-213
Abstract views: 324 | PDF Downloads: 202
DOI:
https://doi.org/10.28925/2663-4023.2023.22.2042013
PDF (Українська)
ENSURING THE SECURITY OF CORPORATE USERS ACCOUNTS
Ivan Tyshyk
214-225
Abstract views: 204 | PDF Downloads: 125
DOI:
https://doi.org/10.28925/2663-4023.2023.22.214225
PDF (Українська)
EXPLORING THE BENEFITS OF CROSS-IMPLEMENTING CYBERSECURITY STANDARDS TO COMBAT RANSOMWARE CYBER CRIMES
Valeriy Dudykevych, Oleh Harasymchuk, Andrii Partyka , Yaroslav Sovyn, Elena Nyemkova
226-237
Abstract views: 326 | PDF Downloads: 141
DOI:
https://doi.org/10.28925/2663-4023.2023.22.226237
PDF (Українська)
METHOD FOR ADAPTING RECURSIVE SYSTEMATIC CONVOLUTIONAL CODES OF TURBO CODES BY BYPASSING THE NODES OF THE SPATIAL GRID
Kurbet Pavlo, Liliia Zaitseva
238-248
Abstract views: 183 | PDF Downloads: 48
DOI:
https://doi.org/10.28925/2663-4023.2023.22.238248
PDF (Українська)
METHODOLOGY FOR THE DEVELOPMENT OF EDUCATIONAL DIGITAL RESOURCES IN THE FORM OF ONLINE GAMES
Olena Skliarenko, Denys Pokydko
249-256
Abstract views: 114 | PDF Downloads: 24
DOI:
https://doi.org/10.28925/2663-4023.2023.22.249256
PDF (Українська)
ANTHROPOMORPHIC NETWORKS AS REPRESENTATIVES OF GLOBAL CONSCIOUSNESS
Serhii Yahodzinskyi , Volodumur Kotsun
257-263
Abstract views: 81 | PDF Downloads: 18
DOI:
https://doi.org/10.28925/2663-4023.2023.22.257263
PDF (Українська)
DEVELOPMENT OF A CORPORATE EDUCATIONAL INFORMATION SYSTEM WITH THE HELP OF MACHINE LEARNING METHODS AND METHODS OF ENSURING INFORMATION SECURITY
Oleksiy Ananchenko
264-273
Abstract views: 69 | PDF Downloads: 30
DOI:
https://doi.org/10.28925/2663-4023.2023.22.264273
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue