Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 23 (2024): Cybersecurity: Education, Science, Technique
Vol. 3 No. 23 (2024): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2024.23
Published:
2024-03-28
Articles
SYNTHESIS OF DISCRETE AND ALGEBRAIC MODELS OF ELEMENTARY FUNCTIONS OF DATA-CONTROLLED OPERATIONS
Volodymyr Rudnytskyi, Nataliia Lada, Dmytro Pidlasyi, Olga Melnyk
6-16
Abstract views: 135 | PDF Downloads: 96
DOI:
https://doi.org/10.28925/2663-4023.2024.23.616
PDF (Українська)
PENETRATION TESTING USING DEEP REINFORCEMENT LEARNING
Anastasiia Tolkachova, Maksym-Mykola Posuvailo
17-30
Abstract views: 149 | PDF Downloads: 116
DOI:
https://doi.org/10.28925/2663-4023.2024.23.1730
PDF (Українська)
CLUSTER ANALYSIS FOR RESEARCHING DIGITAL FOOTPRINTS OF STUDENTS IN EDUCATIONAL INSTITUTIONS
Valeriy Lakhno, Semen Voloshyn, Serhii Mamchenko, Oleg Kulynich, Dmytro Kasatkin
31-41
Abstract views: 203 | PDF Downloads: 73
DOI:
https://doi.org/10.28925/2663-4023.2024.23.3141
PDF (Українська)
MODELING THE DISTRIBUTION OF POLLUTANT CONCENTRATIONS IN THE AIR AND OPTIMIZING THE MONITORING OF THE NETWORK OF EMISSION CONTROL STATIONS
Iryna Dorovska, Volodymyr Dorovskyi, Dmytro Dorovskyi, Скляренко Skliarenko
328-337
Abstract views: 58 | PDF Downloads: 12
DOI:
https://doi.org/10.28925/2663-4023.2024.23.328337
PDF (Українська)
A PROFESSIONAL APPROACH AS A METHOD OF PROTECTING INFORMATION AT THE STAGES OF DEVELOPMENT OF RELATIONAL DATABASES AND SOFTWARE FOR WORKING WITH THEM
Yaroslava Momryk, Yuriy Yashchuk, Roman Tuchapskyi
42-55
Abstract views: 142 | PDF Downloads: 156
DOI:
https://doi.org/10.28925/2663-4023.2024.23.4255
PDF (Українська)
STATISTICAL METHODS FOR PREDICTING PHISHING ATTACKS
Yurii Dobryshyn
56-70
Abstract views: 194 | PDF Downloads: 88
DOI:
https://doi.org/10.28925/2663-4023.2024.23.5670
PDF (Українська)
INFORMATION TECHNOLOGY OF SOFTWARE DATA SECURITY MONITORING
Leonid Kupershtein, Hennadii Lutsyshyn, Mykhailo Krentsin
71-84
Abstract views: 122 | PDF Downloads: 82
DOI:
https://doi.org/10.28925/2663-4023.2024.23.7184
PDF (Українська)
APPLICATION OF IOT PROTOCOLS IN SURFACE WATER POLLUTION MONITORING SYSTEMS
Anton Kovalenko
85-96
Abstract views: 134 | PDF Downloads: 80
DOI:
https://doi.org/10.28925/2663-4023.2024.23.8596
PDF
RESEARCH ON DIFFERENTIAL CRYPTANALYSIS BASED ON DEEP LEARNING
Jiang Xue , Valerii Lakhno, Andrii Sahun
97-109
Abstract views: 132 | PDF Downloads: 82
DOI:
https://doi.org/10.28925/2663-4023.2024.23.97109
PDF
STUDY OF REQUIREMENTS AND CYBER SECURITY ANALYSIS OF THE SOFTWARE OF INFORMATION AND CONTROL SYSTEMS OF NPP, IMPORTANT FOR SECURITY
Borys Vintenko, Iryna Myronets, Oleksii Smirnov, Oksana Kravchuk , Nataliia Kozirova, Hryhorii Savelenko, Anna Kovalenko
111-131
Abstract views: 226 | PDF Downloads: 107
DOI:
https://doi.org/10.28925/2663-4023.2024.23.111131
PDF (Українська)
DETECTION, ANALYSIS AND PROTECTION OF CONFIDENTIAL DATA USING AMAZON MACIE MACHINE LEARNING TECHNOLOGY
Andrii Partyka, Olha Mykhaylova, Stanislav Shpak
132-144
Abstract views: 155 | PDF Downloads: 85
DOI:
https://doi.org/10.28925/2663-4023.2024.23.132144
PDF (Українська)
SECURITY OF PAYMENT TRANSACTIONS: OVERVIEW AND CHARACTERISTICS OF KEY CHANGES IN THE NEW EDITION OF THE PCI DSS STANDARD
Yevhenii Kurii, Ivan Opirskyy
145-155
Abstract views: 229 | PDF Downloads: 115
DOI:
https://doi.org/10.28925/2663-4023.2024.23.145155
PDF (Українська)
REPLICA STATE DISCOVERY PROTOCOL BASED ON ADVANCED MESSAGE QUEUING PROTOCOL
Maksym Kotov , Serhii Toliupa, Volodymyr Nakonechnyi
156-171
Abstract views: 115 | PDF Downloads: 79
DOI:
https://doi.org/10.28925/2663-4023.2024.23.156171
PDF
FEATURES OF MODERN CONCEPTUAL AND TERMINOLOGICAL APPARATUS IN THE FIELD OF TRAINING OF CYBER SECURITY SPECIALISTS
Serhiі Horlichenko
171-181
Abstract views: 147 | PDF Downloads: 116
DOI:
https://doi.org/10.28925/2663-4023.2024.23.171181
PDF (Українська)
ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS
Оlexander Zadereyko, Olena Trofymenko , Nataliia Loginova , Yuliia Loboda , Yuliia Prokop
199-212
Abstract views: 105 | PDF Downloads: 108
DOI:
https://doi.org/10.28925/2663-4023.2024.23.199212
PDF (Українська)
DETECTION OF MALICIOUS ACTIVITY USING A NEURAL NETWORK FOR CONTINUOUS OPERATION
Vladyslav Sosnovyy, Nataliia Lashchevska
213-224
Abstract views: 100 | PDF Downloads: 67
DOI:
https://doi.org/10.28925/2663-4023.2024.23.213224
PDF (Українська)
ANALYSIS OF CYBER THREATS IN THE CONTEXT OF RAPID DEVELOPMENT OF INFORMATION TECHNOLOGY
Oleg Haiduk, Volodymyr Zverev
225-236
Abstract views: 385 | PDF Downloads: 216
DOI:
https://doi.org/10.28925/2663-4023.2024.23.225236
PDF (Українська)
COGNITIVE TECHNOLOGY FOR THE FORMATION OF COMPETENCIES OF STUDENTS IN THE STUDY OF NATURAL SCIENCE SUBJECTS
Alona Desiatko, Natalia Khorolska, Vitalii Chubaievskyi
237-245
Abstract views: 197 | PDF Downloads: 84
DOI:
https://doi.org/10.28925/2663-4023.2024.23.237245
PDF (Українська)
INTERIOR ROOM INFLUENCE ON THE DEFENCE FROM LASER ACOUSTIC INTELLIGENCE SYSTEMS
Liubomyr Parkhuts, Yaroslav Sovyn, Larysa Rakobovchuk
246-257
Abstract views: 101 | PDF Downloads: 132
DOI:
https://doi.org/10.28925/2663-4023.2024.23.246257
PDF (Українська)
MATHEMATICAL METHODS IN CYBER SECURITY: CLUSTER ANALYSIS AND ITS APPLICATION IN INFORMATION AND CYBERNETIC SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva, Nataliia Mazur , Pavlo Skladannyi, Vitalii Nehodenko
258-273
Abstract views: 301 | PDF Downloads: 70
DOI:
https://doi.org/10.28925/2663-4023.2024.23.258273
PDF (Українська)
OVERVIEW OF FRAUD DETECTION SYSTEMS AND PERFORMANCE KPI DEVELOPMENT
Viktor Sahaidak
274-283
Abstract views: 77 | PDF Downloads: 41
DOI:
https://doi.org/10.28925/2663-4023.2024.23.274283
PDF
COMPARISON OF COMPRESSION ALGORITHMS AND HASH FUNCTIONS OF READY-MADE SOFTWARE SOLUTIONS IN THE CONTEXT OF CREATING YOUR OWN APPLICATION
Andrii Fesenko, Rostyslav Hapon
284-309
Abstract views: 83 | PDF Downloads: 32
DOI:
https://doi.org/10.28925/2663-4023.2024.23.284309
PDF (Українська)
CYBERSECURITY MANAGEMENT OF IT PRODUCTS
Ihor Frolov, Yanina Kolodinska
310-317
Abstract views: 64 | PDF Downloads: 23
DOI:
https://doi.org/10.28925/2663-4023.2024.23.310317
PDF (Українська)
PROTECTION OF THE INTRANET WEB RESOURCE FROM EXTERNAL AND INTERNAL THREATS
Larysa Kriuchkova, Mykhailo Yemelianenko
318-327
Abstract views: 72 | PDF Downloads: 22
DOI:
https://doi.org/10.28925/2663-4023.2024.23.318327
PDF (Українська)
METHOD OF DETECTION OF INFORMATION LEAKAGE BY REJECTING TRAFFIC FROM THE INFORMATION COMMUNICATION NETWORK
Sergey Gluhov; Andrii Sobchuk, Volodymyr Rovda, Мykola Рolovinkin, Vitaly Ponomarenko
182-198
Abstract views: 114 | PDF Downloads: 48
DOI:
https://doi.org/10.28925/2663-4023.2024.23.182198
PDF (Українська)
PROTECTION OF SMARTPHONES FROM THE INFLUENCE OF HARMFUL PROGRAMS DURING CHARGING IN PUBLIC PLACES
Larysa Kriuchkova, Oleksandr Steblyna
338-347
Abstract views: 75 | PDF Downloads: 26
DOI:
https://doi.org/10.28925/2663-4023.2024.23.338347
PDF (Українська)
CONVERGENCE OF INFORMATION NETWORKS AS A STRATEGIC SOCIO-CULTURAL INNOVATION
Serhii Yahodzinskyi, Volodymyr Kotsun, Roman Yaroviy
348-355
Abstract views: 34 | PDF Downloads: 17
DOI:
https://doi.org/10.28925/2663-4023.2024.23.348355
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue