Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 27 (2025): Cybersecurity: Education, Science, Technique
Vol. 3 No. 27 (2025): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2025.27
Published:
2025-03-27
Articles
APPLICATION OF LARGE LANGUAGE MODELS FOR BUILDING A “FOREST OF TERM HIERARCHIES”
Olexandr Puchkov, Dmytro Lande, Ihor Subach
6-21
Abstract views: 20 | PDF Downloads: 18
DOI:
https://doi.org/10.28925/2663-4023.2025.27.712
PDF (Українська)
THE METHODOLOGY FOR PROTECTING GRID ENVIRONMENTS FROM MALICIOUS CODE DURING THE EXECUTION OF COMPUTATIONAL TASKS
Yuliia Kostiuk, Nadiia Dovzhenko, Nataliia Mazur, Pavlo Skladannyi, Svitlana Rzaeva
22-40
Abstract views: 20 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.27.710
PDF (Українська)
THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE
Arkadii Chikrii, Ihor Martyniuk, Alona Desiatko, Inna Malyukova, Roman Shyrshov
41-53
Abstract views: 22 | PDF Downloads: 10
DOI:
https://doi.org/10.28925/2663-4023.2025.27.714
PDF (Українська)
ANALYSIS OF MACHINE LEARNING METHODS FOR AUTOMATING PENETRATION TESTING
Anastasiia Zhuravchak, Andriian Piskozub
54-62
Abstract views: 13 | PDF Downloads: 9
DOI:
https://doi.org/10.28925/2663-4023.2025.27.711
PDF (Українська)
RESEARCH OF INFORMATION SECURITY PROVISION METHODS IN A VIRTUAL ENVIRONMENT
Rostyslav Tsekhmeister, Artem Platonenko, Maksym Vorokhob , Vyacheslav Cherevyk, Svitlana Semeniaka
63-71
Abstract views: 18 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.27.703
PDF (Українська)
SYSTEMATIC ANALYSIS OF DIGITAL TRACES IN THE UNIVERSITY INFORMATION AND EDUCATIONAL SYSTEM
Myroslav Lakhno
72-86
Abstract views: 6 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.27.709
PDF (Українська)
ANALYSIS OF KEY METADATA FOR IDENTIFYING DUPLICATES IN BIBLIOGRAPHIC RECORDS
Oleh Vasylenko
87-99
Abstract views: 9 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.27.700
PDF (Українська)
METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES
Yaroslav Oliinyk, Artem Platonenko, Vyacheslav Cherevyk, Maksym Vorokhob, Yurii Shevchuk
100-108
Abstract views: 20 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.27.705
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN THE GAMEDEV
Olena Trofymenko , Anastasiia Dyka, Yuliia Loboda, Anatoly Tolocknov, Maksym Bondarenko
109-119
Abstract views: 10 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.27.701
PDF (Українська)
CURRENT RESEARCH OF INFORMATION INFLUENCES IN SOCIAL NETWORKS
Oleksandr Tkachenko, Anna Ilyenko, Oleksandr Ulichev, Yelyzaveta Meleshko, Liliia Halata
120-140
Abstract views: 13 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.27.716
PDF (Українська)
DEVELOPMENT OF A METHOD FOR OPTIMIZING SOFTWARE CODE BASED ON A GENETIC ALGORITHM
Vladyslav Shorobura, Bohdan Khudik
141-149
Abstract views: 14 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.27.718
PDF (Українська)
MODERN CYBER THREATS TO CRITICAL INFRASTRUCTURE IN UKRAINE AND THE WORLD
Anna Ilyenko, Valentyna Teliushchenko, Olena Dubchak
150-164
Abstract views: 13 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2023.27.719
PDF (Українська)
OSINT TECHNOLOGIES AS A THREAT TO STATE CYBERSECURITY
Valeriia Ivkova, Ivan Opirskyy
165-179
Abstract views: 23 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2025.27.749
PDF (Українська)
INTELLIGENT ENERGY CONSUMPTION MANAGEMENT IN EDGE COMPUTING NETWORKS BASED ON GAME THEORY
Ihor Buchenko
180-192
Abstract views: 6 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.27.732
PDF (Українська)
ELECTROMAGNETIC THREATS IN MODERN CONFLICTS: ANALYSIS OF EW SOURCES CHARACTERISTICS AND THEIR IMPACT ON THE EFFECTIVENESS OF STRIKE SYSTEMS
Roman Bybyk, Ivan Opirskyy
193-204
Abstract views: 6 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2025.27.748
PDF (Українська)
MECHANISM FOR MANAGING ACCESS TO INFORMATION RESOURCES AT AN ENTERPRISE
Tetiana Kapeliushna, Tetiana Muzhanova, Tetiana Berestiana, Sergii Goloborodko, Diana Prymachenko
205-219
Abstract views: 6 | PDF Downloads: 11
DOI:
https://doi.org/10.28925/2663-4023.2025.27.743
PDF (Українська)
EVALUATION OF THE CRYPTOGRAPHIC QUALITIES OF A DATA SOURCE AUTHENTICATION MODEL BASED ON A STREAM CIPHER
Viktor Korniets
220-232
Abstract views: 3 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.27.752
PDF (Українська)
NEURO-FUZZY SYSTEM FOR DETECTING INTRUSIONS INTO THE INFORMATION NETWORK OF CRITICAL INFRASTRUCTURE
Serhii Toliupa, Andrii Kulko
233-247
Abstract views: 7 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.27.750
PDF (Українська)
REVIEW OF EXISTING METHODS FOR ASSESSING DISINFORMATION RISKS IN THE CONTEXT OF HYBRID WARFARE
Vadym Lavrov, Andrii Dudatyev
248-256
Abstract views: 8 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.27.720
PDF (Українська)
SOFTWARE IMPLEMENTATION OF THE PROBLEM OF OPTIMIZING THE CHOICE OF INFORMATION PROTECTION MEANS BASED ON AN EVOLUTIONARY ALGORITHM
Valerii Lakhno , Olena Kryvoruchko, Yerbolat Kalaman
257-268
Abstract views: 11 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.27.751
PDF (Українська)
The THE GENDER EQUALITY IN CYBERSECURITY
Svitlana Luchyk , Oleksandr, Vitalii, Vasyl Luchyk
269-283
Abstract views: 13 | PDF Downloads: 27
DOI:
https://doi.org/10.28925/2663-4023.2025.27.742
PDF (Українська)
RISKS OF INFORMATION LEAKAGE USING ONLINE MACHINE TRANSLATION SERVICES
Lesya Matvienko , Liubov Khomenko
284-293
Abstract views: 0 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.27.730
PDF
CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM
Oksana Onyshchuk
294-303
Abstract views: 6 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.27.727
PDF (Українська)
INTELLIGENT SYSTEM FOR THE PLACEMENT OF URBAN ENVIRONMENTAL MONITORING STATIONS
Andrii Palyvoda, Adlet Kassymbekov
304-319
Abstract views: 16 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.27.728
PDF (Українська)
PHISHING ATTACKS ON ENCRYPTED MESSENGERS: METHODS, RISKS AND PROTECTION RECOMMENDATIONS (USING THE EXAMPLE OF SIGNAL MESSENGER)
Dmytro Prokopovych-Tkachenko , Volodymyr Zverev, Valeriy Bushkov, Boris Khrushkov
320-328
Abstract views: 5 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.27.734
PDF (Українська)
CLOUD BASED ARCHITECTURE FOR ADAPTIVE LOGGING METHOD IMPLEMENTATION
Illia Suprunenko , Volodymyr Rudnytskyi
329-338
Abstract views: 7 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.27.724
PDF
DISTRIBUTED INFORMATION PROCESSING AND CLOUD SERVICES IN COMMERCE, AN ANALYSIS OF PRIOR RESEARCH
Serhii Fedotov, Alona Desiatko
339-353
Abstract views: 9 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.27.725
PDF (Українська)
EVOLUTION OF THE CRYPTOGRAPHIC STRENGTH OF PSEUDORANDOM NUMBER GENERATORS
Oleh Tsebak , Stepan Voytusik
354-367
Abstract views: 5 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.27.706
PDF (Українська)
GRAPH-BASED ANALYSIS OF INFORMATION FLOWS IN TELEGRAM FOR CYBERSECURITY THREAT DETECTION
Anatolii Chornyi , Iryna Stopochkina
368-380
Abstract views: 2 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.27.746
PDF (Українська)
METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)
Roman Shtonda, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii , Pavlo Kutsaiev
380-389
Abstract views: 9 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.27.737
PDF (Українська)
ANALYSIS OF CURRENT PROBLEMS OF SECURITY OF CORPORATE DATABASES IN THE CONDITIONS OF MODERN INFRASTRUCTURE AND WAYS TO SOLUTION THEM
Yurii Shchavinskyi, Oleksandr Budzynskyi
390-405
Abstract views: 5 | PDF Downloads: 11
DOI:
https://doi.org/10.28925/2663-4023.2025.27.726
PDF (Українська)
APPLICATION OF IMPROVED KURAMOTO MODELS FOR IDENTIFYING DISINFORMATION IN SOCIAL NETWORKS
Kateryna Dmytriienko , Nataliia Korshun
406-416
Abstract views: 9 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.27.754
PDF (Українська)
CORRELATIONAL ANALYSIS OF CYBER INCIDENT TYPES IN THE CONTEXT OF INFORMATION TECHNOLOGIES FOR INTERNATIONAL COMMUNICATIONS SECURITY
Oleh Haiduk, Volodymyr Zverev, Hennadii Hulak
417-428
Abstract views: 17 | PDF Downloads: 12
DOI:
https://doi.org/10.28925/2663-4023.2025.27.757
PDF (Українська)
RESEARCH OF ARTIFICIAL INTELLIGENCE TOOLS FOR WORKING WITH DATABASES AND DATA ANALYSIS
Oleksii Smirnov, Liliia Konstantynova, Oksana Konoplitska-Slobodeniuk, Nataliia Kozirova, Nataliia Yakymenko, Oleksandr Dorenskyi , Kostiantyn Buravchenko
429-448
Abstract views: 19 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.27.763
PDF (Українська)
INTELLIGENT RISK ASSESSMENT MODELS IN DISTRIBUTED SYSTEMS BASED ON THE NEURAL NETWORK APPROACH
Dmytro Palko
429-448
Abstract views: 7 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2025.27.764
PDF (Українська)
A DYNAMIC INTERACTION MODEL OF UNMANNED AERIAL VEHICLES WITH A SENSOR NETWORK FOR ENERGY-EFFICIENT MONITORING
Nadiia Dovzhenko, Pavlo Skladannyi, Yevhen V. Ivanichenko, Oleksii Zhyltsov
466-478
Abstract views: 11 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2025.27.766
PDF (Українська)
GENERATION OF GRAPHIC OBJECTS IN THE GODOT ENGINE USING PARALLEL COMPUTATION METHOD
Ihor Tovstochub, Olha Zinchenko
479-488
Abstract views: 6 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.27.768
PDF (Українська)
IMPROVED METHOD OF ASSESSING DAMAGE TO THE NATIONAL SECURITY OF UKRAINE IN CASE OF LEAKAGE OF STATE SECRETS
Yurii Dreis
489-521
Abstract views: 16 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.27.771
PDF (Українська)
METHODS FOR ASSESSING INFORMATION SECURITY IN COMMUNICATION NETWORKS
Oleksandr Laptiev, Vitalii Savchenko, Alla Kobozieva, Anatolii Salii, Tymur Kurtseitov
522-533
Abstract views: 6 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.27.767
PDF (Українська)
DEVELOPMENT OF MODULAR NEURAL NETWORKS FOR DETECTING DIFFERENT CLASSES OF NETWORK ATTACKS
Pavlo Skladannyi, Yuliia Kostiuk, Svitlana Rzaeva, Yuliia Samoilenko, Tetiana Savchenko
534-548
Abstract views: 18 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.27.772
PDF (Українська)
CYBERSECURITY RISK ASSESSMENT FOR SELECTING A CLOUD SERVICE PROVIDER
Mykhailo Khomchak
549-559
Abstract views: 5 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.27.773
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue