Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 4 No. 24 (2024): Cybersecurity: Education, Science, Technique
Vol. 4 No. 24 (2024): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2024.24
Published:
2024-06-26
Articles
RESEARCH OF CYBER SECURITY TECHNOLOGIES OF CLOUD SERVICES IAAS, PAAS AND SAAS
Tetiana Smirnova, Oksana Konoplitska-Slobodeniuk, Kostiantyn Buravchenko, Serhii Smirnov, Oksana 0000-0002-7649-7442, Nataliia Kozirova, Oleksii Smirnov
6-27
Abstract views: 224 | PDF Downloads: 139
DOI:
https://doi.org/10.28925/2663-4023.2024.24.627
PDF (Українська)
THE METHOD OF CONSTRUCTING THE LAW OF THE SECURITY MANAGEMENT SYSTEM OF CRITICAL INFRASTRUCTURE OBJECTS IN THE CONDITIONS OF EXTERNAL UNCONTROLLED INFLUENCES
Iryna Tsyganivska, Andrii Sobchuk, Tetiana Laptieva, Serhii Laptiev, Vitaly Ponomarenko
28-39
Abstract views: 106 | PDF Downloads: 71
DOI:
https://doi.org/10.28925/2663-4023.2024.24.2839
PDF (Українська)
FUNCTIONAL FEATURES OF AN INTELLIGENT INTERNAL AUDIT SUPPORT SYSTEM
Olena Kryvoruchko, Dmytro Hnatchenko
40-49
Abstract views: 111 | PDF Downloads: 64
DOI:
https://doi.org/10.28925/2663-4023.2024.24.4049
PDF
EFFECTIVENESS OF BLOCKCHAIN LOGGING AND SSO IN CYBER SECURITY MECHANISMS
Ivan Opirskyy, Petro Petriv
50-68
Abstract views: 141 | PDF Downloads: 124
DOI:
https://doi.org/10.28925/2663-4023.2024.24.5068
PDF (Українська)
CLASSIFICATION AND METHODS OF DETECTION OF PHISHING ATTACKS
Roman Shtonda, Yuliya Chernish, Tetiana Tereshchenko, Katerina Tereshchenko, Yurii Tsykalo, Serhiy Polishchuk
69-80
Abstract views: 216 | PDF Downloads: 125
DOI:
https://doi.org/10.28925/2663-4023.2024.24.6980
PDF (Українська)
METHODOLOGY FOR ASSESSING THE IMPACT OF INFORMATION THREATS IN THE CONDITIONS OF INFORMATION CONFRONTATION
Olena Hladka, Ivan Karpovich, Anastasiia Tymrakevych
81-89
Abstract views: 71 | PDF Downloads: 53
DOI:
https://doi.org/10.28925/2663-4023.2024.24.8189
PDF
ANALYSIS OF ALGORITHMS FOR THE FORMATION OF CODE STRUCTURES AFFECTING THE QUALITY OF DATA TRANSMISSION IN INFOCOMMUNICATION SYSTEMS
Matin Hadzhyiev, Aleksander Nazarenko, Tetіana Kalinina , Marina Kochetkova, Yanna Petrovich
90-98
Abstract views: 76 | PDF Downloads: 53
DOI:
https://doi.org/10.28925/2663-4023.2024.24.9098
PDF (Українська)
USE OF NON-FUNGIBLE TOKENS AND BLOCKCHAIN TO DEMARCATE ACCESS TO PUBLIC REGISTRIES
Valeriia Balatska, Vasyl Poberezhnyk, Ivan Opirskyy
99-114
Abstract views: 187 | PDF Downloads: 83
DOI:
https://doi.org/10.28925/2663-4023.2024.24.99114
PDF (Українська)
COMPARATIVE STUDY OF TESTS FOR ASSESSMENT OF STATISTICAL CHARACTERISTICS OF RANDOM AND PSEUDO-RANDOM SEQUENCE GENERATORS
Olena Niemkova, Mykhailo Kikh
115-132
Abstract views: 125 | PDF Downloads: 71
DOI:
https://doi.org/10.28925/2663-4023.2024.24.115132
PDF (Українська)
MAIN APPROACHES AND DIRECTIONS OF DEVELOPMENT OF EUROPEAN UNION CYBER SECURITY POLICY
Tetiana Muzhanova , Svitlana Lehominova , Yurii Shchavinsky, Yuriy Yakymenko, Halyna Nesterenko
133-149
Abstract views: 236 | PDF Downloads: 124
DOI:
https://doi.org/10.28925/2663-4023.2024.24.133149
PDF (Українська)
FINANCIAL CRIMES IN CYBER SPACE: RISKS AND THREATS OF LEGALIZATION OF ILLEGAL FINANCIAL ASSETS
Yurii Borsukovskyi, Victoria Borsukovska
150-160
Abstract views: 88 | PDF Downloads: 45
DOI:
https://doi.org/10.28925/2663-4023.2024.24.150160
PDF (Українська)
IMPLEMENTATION OF A BAYESIAN NETWORK IN PYTHON FOR ANALYSIS OF CYBERCRIMES ASSOCIATED WITH DDOS ATTACKS
Valerii Lakhno, Semen Voloshyn, Sergii Mamchenko, Volodymyr Matiyevsky, Myroslav Lakhno
161-171
Abstract views: 150 | PDF Downloads: 60
DOI:
https://doi.org/10.28925/2663-4023.2024.24.161171
PDF (Українська)
ANALYSIS OF CYBER ATTACKS AND THE ACTIVITIES OF APT GROUPS IN UKRAINE
Maksym Opanovych
172-184
Abstract views: 163 | PDF Downloads: 85
DOI:
https://doi.org/10.28925/2663-4023.2024.24.172184
PDF (Українська)
TECHNICAL ASPECTS OF BUILDING A FAULT-TOLERANT SENSOR NETWORK INFRASTRUCTURE
Oleh Barabash, Nataliya Ausheva, Pavlo Skladannyi, Yevhen Ivanichenko, Nadiia Dovzhenko
185-195
Abstract views: 159 | PDF Downloads: 62
DOI:
https://doi.org/10.28925/2663-4023.2024.24.185195
PDF (Українська)
MODELING OF INFORMATION TECHNOLOGY FOR THE FORMATION OF COMPETENCIES OF STUDENTS
Olena Kryvoruchko, Rostyslav Zakharov
196-204
Abstract views: 130 | PDF Downloads: 84
DOI:
https://doi.org/10.28925/2663-4023.2024.24.196204
PDF (Українська)
ANALYSIS OF MODERN TRENDS IN THE DEVELOPMENT OF INFORMATION SYSTEMS
Olha Tkachenko , Kostiantyn Tkachenko, Mykhailo Piddubchenko
205-220
Abstract views: 173 | PDF Downloads: 71
DOI:
https://doi.org/10.28925/2663-4023.2024.24.205220
PDF (Українська)
TYPES OF DIGITAL FORENSIC ARTIFACTS IN WINDOWS COMPUTERS
Oleksandr Bohdanov, Ivan Chernihivskyi
221-228
Abstract views: 116 | PDF Downloads: 65
DOI:
https://doi.org/10.28925/2663-4023.2024.24.221228
PDF (Українська)
ATTACK SURFACE IN THE CONTEXT OF ITS USERS (“TREAT ACTORS”) FOR CRITICAL INFRASTRUCTURE FACILITIES
Oleksii Skitsko, Roman Shyrshov
229-240
Abstract views: 145 | PDF Downloads: 91
DOI:
https://doi.org/10.28925/2663-4023.2024.24.229240
PDF (Українська)
SOFTWARE AND HARDWARE IMPLEMENTATION OF THE ALGORITHM FOR QUICK ASSESSMENT OF WI-FI SIGNAL POWER AT POINTS OF THE URBANIZED SPACE
Larysa Kriuchkova, Nikita Leontiuk
241-256
Abstract views: 91 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2024.24.241256
PDF (Українська)
METHODS FOR IDENTIFYING OPTIMAL AND NON-OPTIMAL MODES OF COMMUNICATION LINES FUNCTIONING IN CYBER SYSTEMS
Iryna Dorovska , Volodymyr Dorovskyi, Dmytro Dorovskoy , Roman Yaroviy
257-265
Abstract views: 87 | PDF Downloads: 38
DOI:
https://doi.org/10.28925/2663-4023.2024.24.257265
PDF (Українська)
A METHOD FOR PREPARING INITIAL POLYNOMIALS FOR RECURSIVE SYSTEMATIC CONVOLUTIONAL TURBO CODES USING A GENETIC ALGORITHM
Pavlo Kurbet
266-281
Abstract views: 97 | PDF Downloads: 29
DOI:
https://doi.org/10.28925/2663-4023.2024.24.266281
PDF (Українська)
METHOD OF RATIONAL SYNTHESIS OF SUBSYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF INFORMATION IN CRITICAL INFRASTRUCTURE NETWORKS
Yevhen Hulak
282-297
Abstract views: 99 | PDF Downloads: 51
DOI:
https://doi.org/10.28925/2663-4023.2024.24.282297
PDF (Українська)
METHODS AND MEANS OF USING NEURAL NETWORKS FOR CRYPTOGRAPHY
Valeryi Pashorin, Ilya Ostapchuk, Oleksandr Nikolayevsky, Viktor Milashenko
298-311
Abstract views: 112 | PDF Downloads: 68
DOI:
https://doi.org/10.28925/2663-4023.2024.24.298311
PDF (Українська)
SOFTWARE IMPLEMENTATION OF THE CALCULATION OF THE FRAME ANTENNAS FIELD SPATIAL DISTRIBUTION
Larysa Kriuchkova, Vitalii Diakiv
312-320
Abstract views: 93 | PDF Downloads: 35
DOI:
https://doi.org/10.28925/2663-4023.2024.24.312320
PDF (Українська)
METHODS OF BUILDING DURABLE UDP PORT MAPPINGS IN A NAT-BASED ENVIRONMENT
Maksym Kotov, Serhii Toliupa
321-340
Abstract views: 105 | PDF Downloads: 57
DOI:
https://doi.org/10.28925/2663-4023.2024.24.321340
PDF
ARCHITECTURAL APPROACHES TO THE DEVELOPMENT OF SCALABLE WEB APPLICATIONS
Olena Skliarenko , Yaroslav Savchenko , Leonid Lytvynenko, Orest Sushynskyi
341-350
Abstract views: 155 | PDF Downloads: 70
DOI:
https://doi.org/10.28925/2663-4023.2024.24.341350
PDF (Українська)
THE METHOD OF SEISMOACOUSTIC MONITORING OF THE INFLUENCE OF THE EXPLOSIVE WAVE ON CRITICAL INFRASTRUCTURE OBJECTS
Anatolii Shevchenko
351-362
Abstract views: 55 | PDF Downloads: 35
DOI:
https://doi.org/10.28925/2663-4023.2024.24.351362
PDF (Українська)
ANALYSIS OF METHODS AND ALGORITHMS FOR RECOGNITION AND IDENTIFICATION OF IMAGES BY THEIR SEPARATE FRAGMENTS
Liudmyla Zubyk , Sergii Puzhai-Chereda , Oleksandr Sapelnykov, Denis Kalugin, Maksym Kotliar
363-375
Abstract views: 112 | PDF Downloads: 48
DOI:
https://doi.org/10.28925/2663-4023.2024.24.363375
PDF (Українська)
OPTIMIZING PARAMETERS OF UNIVERSITY CLOUD SYSTEMS TO ENSURE RELIABILITY AND SECURITY IN IDENTITY DECENTRALIZATION
Valery Lakhno, Volodymyr Moskalenko
376-387
Abstract views: 103 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2024.24.376387
PDF (Українська)
MODIFIED MODEL OF IMAGE NOISE FILTRATION BASED ON CONVOLUTIONAL NEURAL NETWORK
Vadym Mukhin , Andrii Lynovskyi
388-397
Abstract views: 34 | PDF Downloads: 13
DOI:
https://doi.org/10.28925/2663-4023.2024.24.388397
PDF (Українська)
METHODS OF NATURAL LANGUAGE ANALYSIS USING NEURAL NETWORKS IN CYBER SECURITY
Ievgen Iosifov, Volodymyr Sokolov
398-414
Abstract views: 12 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2024.24.398414
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue