Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 25 (2024): Cybersecurity: Education, Science, Technique
Vol. 1 No. 25 (2024): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2024.25
Published:
2024-09-25
Articles
STUDY OF THE CURRENT STATE OF SIEM SYSTEMS
Tetiana Smirnova, Liliia Konstantynova, Oksana Konoplitska-Slobodeniuk, Yan Kozlov, Oksana Kravchuk, Nataliia Kozirova, Oleksii Smirnov
6-18
Abstract views: 97 | PDF Downloads: 66
DOI:
https://doi.org/10.28925/2663-4023.2024.25.618
PDF (Українська)
INVESTIGATION OF THE USE OF OSINT TECHNOLOGY AS A NEW THREAT OF DE-ANONYMIZED PERSONS ON THE INTERNET SPACE
Anastasiia Hlavatska, Oksana Anhelska, Ivan Opirskyy
19-50
Abstract views: 271 | PDF Downloads: 146
DOI:
https://doi.org/10.28925/2663-4023.2024.25.1950
PDF (Українська)
CONTROL OF CYBER SECURITY PARAMETERS AS A MECHANISM FOR EVALUATING THE EFFECTIVENESS OF PROTECTION AND FORECASTING THE SITUATION
Valerii Yermoshyn
51-58
Abstract views: 85 | PDF Downloads: 42
DOI:
https://doi.org/10.28925/2663-4023.2024.25.5158
PDF (Українська)
THE DANGER OF USING TELEGRAM AND ITS IMPACT ON UKRAINIAN SOCIETY
Valentyna Zaporozhets, Ivan Opirskyy
59-78
Abstract views: 137 | PDF Downloads: 116
DOI:
https://doi.org/10.28925/2663-4023.2024.25.5978
PDF (Українська)
NFC TECHNOLOGY AS A MEANS OF PROTECTED EXCHANGE OF IDENTIFICATION DATA BETWEEN PEER-TO-PEER NETWORK NODES
Mykhailo Krentsin, Leonid Kupershtein
79-88
Abstract views: 46 | PDF Downloads: 37
DOI:
https://doi.org/10.28925/2663-4023.2024.25.7988
PDF (Українська)
METHODS AND MEANS OF TRAFFIC FLOW CONTROL
Andrii Danyliuk , Oleksandr Muliarevych
89-102
Abstract views: 27 | PDF Downloads: 17
DOI:
https://doi.org/10.28925/2663-4023.2024.25.89102
PDF (Українська)
DEVELOPMENT OF BAYESIAN NETWORKS FOR A DECISION SUPPORT SYSTEM DURING INTERNAL CYBER THREATS ANALYSIS
Andrii Hlazunov
103-117
Abstract views: 40 | PDF Downloads: 19
DOI:
https://doi.org/10.28925/2663-4023.2024.25.103117
PDF (Українська)
SYNERGISTIC ARCHITECTURE FOR AUTOMATED DETECTION OF TARGETED INFORMATION ATTACKS
Oleksandr Kosohov
118-128
Abstract views: 32 | PDF Downloads: 15
DOI:
https://doi.org/10.28925/2663-4023.2024.25.118128
PDF (Українська)
MODERN INFORMATION SPACE AND ISSUES OF CYBER SECURITY
Heorhii Suskiy
129-139
Abstract views: 65 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2024.25.129139
PDF (Українська)
COMPARISON OF DIGITAL SIGNAL PROCESSING METHODS AND DEEP LEARNING MODELS IN VOICE AUTHENTICATION
Khrystyna Ruda, Dmytro Sabodashko, Halyna Mykytyn, Mariia Shved, Sviatoslav Borduliak, Nataliia Korshun
140-160
Abstract views: 73 | PDF Downloads: 60
DOI:
https://doi.org/10.28925/2663-4023.2024.25.140160
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN THE MILITARY
Olena Trofymenko , Nataliia Loginova , Artem Sokolov, Pavlo Chykunov , Hanna Akhmametieva
161-176
Abstract views: 216 | PDF Downloads: 74
DOI:
https://doi.org/10.28925/2663-4023.2024.25.161176
PDF (Українська)
ANALYSIS OF THE PROBLEM OF SQL-INJECTIONS IN WEB APPLICATIONS
Katerina Tereshchenko, Tetiana Tereshchenko, Chernish Yuliya, Roman Shtonda, Olena Bokii
177-199
Abstract views: 67 | PDF Downloads: 34
DOI:
https://doi.org/10.28925/2663-4023.2024.25.177199
PDF (Українська)
OVERVIEW OF MODERN AUTHENTICATION METHODS FOR MICROCONTROLLERS
Taras Chura, Nazar Chura
200-214
Abstract views: 63 | PDF Downloads: 38
DOI:
https://doi.org/10.28925/2663-4023.2024.25.200214
PDF (Українська)
PROTECTION OF INFORMATION IN ELECTRONIC SERVICES
Yuliia Khavikova
215-228
Abstract views: 70 | PDF Downloads: 51
DOI:
https://doi.org/10.28925/2663-4023.2024.25.215228
PDF (Українська)
INFORMATION PROTECTION AND DATA EXCHANGE SECURITY IN WIRELESS MOBILE NETWORKS WITH AUTHENTICATION AND KEY EXCHANGE PROTOCOLS
Yuliia Kostiuk, Bohdan Bebeshko, Larysa Kriuchkova, Valerii Lytvynov, Iryna Oksanych, Pavlo Skladannyi, Karyna Khorolska
229-252
Abstract views: 117 | PDF Downloads: 30
DOI:
https://doi.org/10.28925/2663-4023.2024.25.229252
PDF (Українська)
RESEARCH OF INFORMATION SECURITY AND TECHNOLOGICAL REGULATIONS OF THE MANAGEMENT PROCESSES OF THE CRITICAL INFRASTRUCTURE OF A NPP POWER UNIT WITH A VVER-1000 REACTOR
Borys Vintenko, Iryna Myronets, Oleksii Smirnov, Oleksandr Kovalenko, Serhii Smirnov, Kostiantyn Buravchenko, Nataliia Yakymenko
253-278
Abstract views: 63 | PDF Downloads: 25
DOI:
https://doi.org/10.28925/2663-4023.2024.25.253278
PDF (Українська)
ANALYSIS OF SECRET DISTRIBUTION METHODS
Mykyta Tsikhotskyi, Volodymyr Luzhetskyi
279-293
Abstract views: 37 | PDF Downloads: 20
DOI:
https://doi.org/10.28925/2663-4023.2024.25.279293
PDF (Українська)
THE THREATS OF OSINT TOOLS AND WAYS TO MITIGATE THE CONSEQUENCES OF THEIR APPLICATION FOR THE ORGANIZATION
Svitlana Lehominova, Yurii Shchavinsky, Dmytro Rabchun, Mykhailo Zaporozhchenko, Oleksandr Budzynskyi
294-303
Abstract views: 105 | PDF Downloads: 62
DOI:
https://doi.org/10.28925/2663-4023.2024.25.294303
PDF (Українська)
FEASIBILITY OF USING HANDSHAKE DOMAIN NAMES IN COMPARISON WITH THE CLASSIC DNS
Olena Niemkova, Oleksand-Iurii Pavliuk
304-317
Abstract views: 68 | PDF Downloads: 35
DOI:
https://doi.org/10.28925/2663-4023.2024.25.304317
PDF (Українська)
PROSPECTS OF INTEGRATION OF ARTIFICIAL INTELLIGENCE IN CYBERSECURITY SYSTEMS
Anna Ilyenko, Sergii Ilyenko , Olesia Yakovenko, Yevheniia Halych, Vladyslav Pavlenko
318-329
Abstract views: 138 | PDF Downloads: 56
DOI:
https://doi.org/10.28925/2663-4023.2024.25.318329
PDF (Українська)
DECISION-MAKING ON THE BASE OF LINEAR OPTIMIZATION IN THE PROCESS OF MANAGEMENT OF INFORMATION SECURITY RISKS
Yuliia Zhdanovа, Svitlana Shevchenko, Svitlana Spasiteleva, Oleg Sokulsky
330-343
Abstract views: 77 | PDF Downloads: 39
DOI:
https://doi.org/10.28925/2663-4023.2024.25.330343
PDF (Українська)
MODELING AN INFORMATION SYSTEM FOR THE ORGANIZATION OF EDUCATIONAL AND METHODOLOGICAL SUPPORT OF HIGHER EDUCATION INSTITUTIONS BASED ON MICROLEARNING METHODS
Oleksandr Kharchenko, Anastasiia Liahera
344-354
Abstract views: 51 | PDF Downloads: 19
DOI:
https://doi.org/10.28925/2663-4023.2024.25.344354
PDF (Українська)
J-FINDER – A WEB-ORIENTED JOB SEARCH DECISION SUPPORT SYSTEM
Olha Ткаченко, Kostiantyn Tkachenko, Oleksandr Tkachenko , Vladyslav Vozniuk
355-378
Abstract views: 26 | PDF Downloads: 16
DOI:
https://doi.org/10.28925/2663-4023.2024.25.355378
PDF (Українська)
OVERVIEW OF CYBERSECURITY METHODS AND STRATEGIES USING ARTIFICIAL INTELLIGENCE
Olha Lunhol
379-389
Abstract views: 180 | PDF Downloads: 84
DOI:
https://doi.org/10.28925/2663-4023.2024.25.379389
PDF (Українська)
INTEGRATION OF SECURITY AND FAULT TOLERANCE IN SENSOR NETWORKS BASED ON THE ANALYSIS OF ENERGY CONSUMPTION AND TRAFFIC
Nadiia Dovzhenko, Yevhen Ivanichenko, Pavlo Skladannyi, Nataliya Ausheva
390-400
Abstract views: 95 | PDF Downloads: 33
DOI:
https://doi.org/10.28925/2663-4023.2024.25.390400
PDF (Українська)
MATHEMATICAL MODEL OF A SYMMETRICAL CRYPTOGRAPHIC SYSTEM FOR THE PROTECTION OF SPEECH INFORMATION BASED ON DIFFERENTIAL TRANSFORMATIONS
Olga Hryshchuk
401-409
Abstract views: 47 | PDF Downloads: 33
DOI:
https://doi.org/10.28925/2663-4023.2024.25.401409
PDF
BUILDING A MOVING OBJECT IDENTIFICATION SYSTEM BASED ON MACHINE LEARNING TECHNOLOGIES
Nazar Ohonoiuk, Mariia Nazarkevych, Yurii Myshkovskyi, Nazar Nakonechnyi, Roman Romanchuk
410-433
Abstract views: 80 | PDF Downloads: 40
DOI:
https://doi.org/10.28925/2663-4023.2024.25.410433
PDF (Українська)
APPLICATION OF METRIC METHODS OF HISTOGRAM COMPARISON FOR DETECTING CHANGES IN ENCRYPTED NETWORK TRAFFIC
Ihor Subach , Dmytro Sharadkin, Ihor Yakoviv
434-448
Abstract views: 59 | PDF Downloads: 22
DOI:
https://doi.org/10.28925/2663-4023.2024.25.434448
PDF (Українська)
DISINFORMATION, FAKES AND PROPAGANDA IDENTIFICATION METHODS IN MASS MEDIA BASED ON MACHINE LEARNING
Vitalii Danylyk, Victoria Vysotska, Mariia Nazarkevych
449-467
Abstract views: 107 | PDF Downloads: 59
DOI:
https://doi.org/10.28925/2663-4023.2024.25.449467
PDF (Українська)
COMPARATIVE ANALYSIS OF METHODS, TECHNOLOGIES, SERVICES, AND PLATFORMS FOR SPEECH RECOGNITION IN INFORMATION SECURITY SYSTEMS
Ievgen Ievgen, Volodymyr Sokolov
468-486
Abstract views: 80 | PDF Downloads: 61
DOI:
https://doi.org/10.28925/2663-4023.2024.25.468486
PDF (Українська)
METHOD FOR ASSESSING CONSEQUENCES OF LOS A CRITICAL INFORMATION INFRASTRUCTURE OBJECT BY GENERALIZED CRITERIA
Yurii Dreis
487-504
Abstract views: 76 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2024.25.487504
PDF (Українська)
1STRUCTURAL MODEL OF THE CYBERSECURITY ASSESSMENT SYSTEM OF CLOUD SERVICES OF INFORMATION INFRASTRUCTURE OBJECTS
Ihor Ivanchenko, Yevhenii Pedchenko
505-515
Abstract views: 35 | PDF Downloads: 12
DOI:
https://doi.org/10.28925/2663-4023.2024.25.505515
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue