Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 26 (2024): Cybersecurity: Education, Science, Technique
Vol. 2 No. 26 (2024): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2024.26
Published:
2024-12-19
Articles
RESEARCH OF THE APPLICATION OF SUPPORT SYSTEMS FOR THE OPERATING STAFF OF A CRITICAL INFRASTRUCTURE FACILITY WHEN CONTROLLING A NPP POWER UNIT WITH A VVER-1000 REACTOR
Borys Vintenko, Iryna Myronets, Oleksii Smirnov, Anna Kovalenko, Oksana Konoplitska-Slobodeniuk, Tetiana Smirnova, Liliia Konstantynova
6-26
Abstract views: 129 | PDF Downloads: 74
DOI:
https://doi.org/10.28925/2663-4023.2024.26.673
PDF (Українська)
STUDYING THE RESISTANCE OF BIOMETRIC AUTHENTICATION SYSTEMS TO ATTACKS USING VOICE CLONING TECHNOLOGY BASED ON DEEP NEURAL NETWORKS
Tatiana Savkova, Ivan Opirskyy, Dmytro Sabodashko
27-43
Abstract views: 135 | PDF Downloads: 100
DOI:
https://doi.org/10.28925/2663-4023.2024.26.670
PDF (Українська)
EXTRACTION OF CYBERSECURITY OBJECTS FROM ARRAYS OF ELECTRONIC TEXT DOCUMENTS ON THE INTERNET AND SOCIAL NETWORKS
Olexandr Puchkov, Dmytro Lande, Ihor Subach
44-55
Abstract views: 90 | PDF Downloads: 50
DOI:
https://doi.org/10.28925/2663-4023.2024.26.663
PDF (Українська)
IMPLEMENTATION OF DATABASE SECURITY BASED ON ORACLE AUDIT VAULT AND DATABASE FIREWALL
Ivan Tyshyk
56-70
Abstract views: 77 | PDF Downloads: 41
DOI:
https://doi.org/10.28925/2663-4023.2024.26.666
PDF (Українська)
VECTOR ALGEBRA FOR GAMEDEV
Olena Trofymenko, Оlexander Zadereyko, Nataliia Balandina , Anatoly Tolocknov , Illia Huselnikov
71-80
Abstract views: 118 | PDF Downloads: 33
DOI:
https://doi.org/10.28925/2663-4023.2024.26.626
PDF (Українська)
RESEARCH ON ISSUES OF INFORMATION SECURITY RISKS ASSESSMENT AND MANAGEMENT IN THE SECURITY AND DEFENSE SECTOR AND FORMATION OF SECURITY LEVEL INDICATORS
Volodymyr Tkach, Oleksandr Shemendiuk, Oleksiy Cherednychenko
81-94
Abstract views: 124 | PDF Downloads: 36
DOI:
https://doi.org/10.28925/2663-4023.2024.26.636
PDF (Українська)
QUANTITATIVE METHODOLOGY FOR ASSESSING CYBERSECURITY RISKS IN THE ABSENCE OF FINANCIAL DATA ON LOSSES
Oleksii Baidur
95-114
Abstract views: 104 | PDF Downloads: 33
DOI:
https://doi.org/10.28925/2663-4023.2024.26.659
PDF (Українська)
METHODS FOR TESTING THE SECURITY OF WEB APPLICATIONS
Anastasiia Tolkachova , Andriian Piskozub
115-122
Abstract views: 164 | PDF Downloads: 110
DOI:
https://doi.org/10.28925/2663-4023.2024.26.668
PDF (Українська)
DESIGN OF SYMMETRIC CRYPTOGRAPHIC DIFFERENTIAL DISTINGUISHER BASED ON DEEP LEARNING
Xue Jiang, Valerii Lakhno, Andrii Sahun, Sergii Mamchenko
123-139
Abstract views: 110 | PDF Downloads: 42
DOI:
https://doi.org/10.28925/2663-4023.2024.26.674
PDF (Українська)
METHODOLOGY FOR INVESTIGATING INFORMATION SECURITY INCIDENTS
Diana Tsyrkaniuk, Volodymyr Sokolov
140-154
Abstract views: 128 | PDF Downloads: 64
DOI:
https://doi.org/10.28925/2663-4023.2024.26.675
PDF (Українська)
ANALYTICAL REVIEW OF MODELS AND SYSTEMS FOR NETWORK TRAFFIC CLASSIFICATION
Pavlo Pidhornyi
155-169
Abstract views: 129 | PDF Downloads: 67
DOI:
https://doi.org/10.28925/2663-4023.2024.26.639
PDF
LEGAL BASIS FOR THE DISSEMINATION OF INFORMATION INFLUENCES IN SOCIAL NETWORKS
Oleksandr Tkachenko, Anna Ilyenko , Oleksandr Ulichev, Yelyzaveta Meleshko, Oleksii Smirnov
170-188
Abstract views: 121 | PDF Downloads: 48
DOI:
https://doi.org/10.28925/2663-4023.2024.26.685
PDF (Українська)
RESEARCH OF PROBLEMS OF ENSURING THE SECURITY OF PERSONAL DATA AND CONFIDENTIAL INFORMATION IN THE CONTEXT OF COUNTER-OSINT
Valeriia Ivkova, Ivan Opirskyy
189-199
Abstract views: 163 | PDF Downloads: 57
DOI:
https://doi.org/10.28925/2663-4023.2024.26.682
PDF (Українська)
MODEL OF PARAMETERS FOR ASSESSING CONSEQUENCES OF LEAKAGE OFFICIAL INFORMATION FROM OBJECT OF CRITICAL INFRASTRUCTURE
Yurii Dreis
200-211
Abstract views: 98 | PDF Downloads: 31
DOI:
https://doi.org/10.28925/2663-4023.2024.26.691
PDF (Українська)
APPLICATION OF THE MATHEMATICAL CATASTROPHE THEORY TO ENSURE THE STABILITY OF THE INFORMATION SECURITY MANAGEMENT SYSTEM
Vitalii Nehodenko
212-222
Abstract views: 74 | PDF Downloads: 32
DOI:
https://doi.org/10.28925/2663-4023.2024.26.692
PDF (Українська)
INTEGRATED APPROACH TO DETECTING BLUETOOTH THREATS USING WIRESHARK AND SPLUNK SIEM
Olha Partyka, Bohdan Fihol, Taras Nakonechnyi
223-234
Abstract views: 85 | PDF Downloads: 48
DOI:
https://doi.org/10.28925/2663-4023.2024.26.684
PDF (Українська)
REGULATORY FRAMEWORK FOR THE DEVELOPMENT OF AN ORGANISATION'S INFORMATION SECURITY MANAGEMENT POLICY
Tetiana Kapeliushna, Svitlana Lehominova, Tetiana Muzhanova, Vitalii Tyshchenko
235-245
Abstract views: 133 | PDF Downloads: 66
DOI:
https://doi.org/10.28925/2663-4023.2024.26.693
PDF (Українська)
MOBILE DEVICE FORENSICS: COMPARISON OF MOBILE ENCRYPTION HARDWARE AND SOFTWARE
Oksana Onyshchuk
246-257
Abstract views: 80 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2024.26.687
PDF (Українська)
COMMUNICATION PROCESSES SECURITY USING VISUAL CRYPTOGRAPHY
Iryna Rymchuk, Serhii Kostiuchko, Mykola Polishchuk, Serhii Hryniuk, Liudmyla Konkevych
258-267
Abstract views: 91 | PDF Downloads: 30
DOI:
https://doi.org/10.28925/2663-4023.2024.26.677
PDF (Українська)
THE CONCEPT OF APPLYING BLOCKCHAIN TECHNOLOGIES TO INCREASE THE SECURITY OF PERSONAL DATA OF THE “DIYA” PLATFORM: COMPLIANCE WITH THE REQUIREMENTS OF THE GDPR AND UKRAINIAN LEGISLATION
Valeriia Balatska, Vasyl Poberezhnyk
268-290
Abstract views: 121 | PDF Downloads: 96
DOI:
https://doi.org/10.28925/2663-4023.2024.26.681
PDF (Українська)
LOW-SPEED HTTP DDOS ATTACK PREVENTION MODEL FOR END USERS
Petro Ponochovny
291-304
Abstract views: 135 | PDF Downloads: 68
DOI:
https://doi.org/10.28925/2663-4023.2024.26.695
PDF (Українська)
INFORMATION RETRIEVAL AND DEANONYMIZATION IN THE TASKS OF EARLY DETECTION OF POTENTIAL ATTACKS ON CRITICAL INFRASTRUCTURE
Oleksii Chalyi, Iryna Stopochkina
305-322
Abstract views: 223 | PDF Downloads: 57
DOI:
https://doi.org/10.28925/2663-4023.2024.26.694
PDF (Українська)
INFLUENCE ON THE TRAIN AUTOMATION SYSTEM THROUGH DIAGNOSTIC EQUIPMENT AND FIRMWARE MODIFICATION ON THE EQUIPMENT
Serhii Yevdokymov
323-337
Abstract views: 63 | PDF Downloads: 25
DOI:
https://doi.org/10.28925/2663-4023.2024.26.643
PDF (Українська)
MATHEMATICAL MODEL FOR AUTOMATED SYSTEMS OF SEISMOACOUSTIC MONITORING OF A MORTAR EXPLOSION CLASSIFICATION FOR CONDUCTING REMOTE RECONNAISSANCE
Ihor Yarmolai, Ihor Pampukha
338-347
Abstract views: 70 | PDF Downloads: 29
DOI:
https://doi.org/10.28925/2663-4023.2024.26.697
PDF
REVIEW OF TECHNOLOGIES FOR STORING AND ANALYZING DATA FROM SATELLITE IMAGES AND AERIAL PHOTOGRAPHY
Myroslav Riabyi , Yurii Honcharuk , Yuliia Polishchuk
348-360
Abstract views: 87 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2024.26.690
PDF (Українська)
METHOD OF RECOGNITION OF MOVING OBJECTS BASED ON THE CLASSIFICATION OF HAAR CASCADES
Mariia Nazarkevych, Vasyl Lytvyn, Victoria Vysotska
361-373
Abstract views: 85 | PDF Downloads: 40
DOI:
https://doi.org/10.28925/2663-4023.2024.26.698
PDF (Українська)
ANALYSIS OF SECURITY INCIDENT INVESTIGATION TECHNOLOGI AT CRITICAL INFRASTRUCTURE FACILITIES
Valerii Kozachok, Mykhailo Drapatyi
374-391
Abstract views: 90 | PDF Downloads: 29
DOI:
https://doi.org/10.28925/2663-4023.2024.26.699
PDF (Українська)
TREE-BASED STATE SHARDING FOR SCALABILITY AND LOAD BALANCING IN MULTICHAIN SYSTEMS
Maksym Kotov
392-408
Abstract views: 70 | PDF Downloads: 35
DOI:
https://doi.org/10.28925/2663-4023.2024.26.702
PDF
THE THREATS FROM USING CLOUD SERVICES IN THE FIELD OF CYBER SECURITY
Anastasiia Vavilenkova
409-416
Abstract views: 80 | PDF Downloads: 31
DOI:
https://doi.org/10.28925/2663-4023.2024.26.704
PDF (Українська)
FUZZY COGNITIVE MAPS AS A TOOL FOR VISUALIZING INCIDENT RESPONSE SCENARIOS IN SECURITY SYSTEMS
Svitlana Shevchenko, Yuliia Zhdanovа, Pavlo Skladannyi, Taras Petrenko
417-429
Abstract views: 133 | PDF Downloads: 42
DOI:
https://doi.org/10.28925/2663-4023.2024.26.707
PDF (Українська)
INTEGRATION OF IOT AND ARTIFICIAL INTELLIGENCE INTO INTELLIGENT TRANSPORTATION SYSTEMS
Nadiia Dovzhenko, Nataliia Mazur, Yuliia Kostiuk, Svitlana Rzaieva
430-444
Abstract views: 141 | PDF Downloads: 40
DOI:
https://doi.org/10.28925/2663-4023.2024.26.708
PDF (Українська)
AUTOMATIC SCALATION METHODS IN CLOUD ENVIRONMENTS
Andrii Pazynin
445-459
Abstract views: 39 | PDF Downloads: 76
DOI:
https://doi.org/10.28925/2663-4023.2024.26.715
PDF (Українська)
NEW METHODS OF TRAFFIC DISTRIBUTION ON THE PERFORMANCE OF MODERN CLOUD PLATFORMS
Pavlo Kudrynskyi, Oleksandr Zvenyhorodskyi
460-475
Abstract views: 51 | PDF Downloads: 21
DOI:
https://doi.org/10.28925/2663-4023.2024.26.717
PDF (Українська)
METHODOLOGY FOR FORMING A HIGH-SPEED IMITATOR-RESISTANT CIPHER FOR MULTI-ALPHABET SUBSTITUTION
Viktor Korniiets, Yuliia Zhdanovа
476-486
Abstract views: 81 | PDF Downloads: 23
DOI:
https://doi.org/10.28925/2663-4023.2024.26.723
PDF (Українська)
METHOD OF COMPREHENSIVE CYBERSECURITY RISKS ASSESSMENT IN DISTRIBUTED INFORMATION SYSTEMS
Dmytro Palko, Larysa Myrutenko
487-502
Abstract views: 53 | PDF Downloads: 38
DOI:
https://doi.org/10.28925/2663-4023.2024.26.731
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue