Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 27 (2025): Cybersecurity: Education, Science, Technique
Vol. 3 No. 27 (2025): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2025.27
Published:
2025-03-27
Articles
APPLICATION OF LARGE LANGUAGE MODELS FOR BUILDING A “FOREST OF TERM HIERARCHIES”
Olexandr Puchkov, Dmytro Lande, Ihor Subach
6-21
Abstract views: 184 | PDF Downloads: 174
DOI:
https://doi.org/10.28925/2663-4023.2025.27.712
PDF (Українська)
THE METHODOLOGY FOR PROTECTING GRID ENVIRONMENTS FROM MALICIOUS CODE DURING THE EXECUTION OF COMPUTATIONAL TASKS
Yuliia Kostiuk, Nadiia Dovzhenko, Nataliia Mazur, Pavlo Skladannyi, Svitlana Rzaeva
22-40
Abstract views: 227 | PDF Downloads: 112
DOI:
https://doi.org/10.28925/2663-4023.2025.27.710
PDF (Українська)
THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE
Arkadii Chikrii, Ihor Martyniuk, Alona Desiatko, Inna Malyukova, Roman Shyrshov
41-53
Abstract views: 173 | PDF Downloads: 87
DOI:
https://doi.org/10.28925/2663-4023.2025.27.714
PDF (Українська)
ANALYSIS OF MACHINE LEARNING METHODS FOR AUTOMATING PENETRATION TESTING
Anastasiia Zhuravchak, Andriian Piskozub
54-62
Abstract views: 151 | PDF Downloads: 134
DOI:
https://doi.org/10.28925/2663-4023.2025.27.711
PDF (Українська)
RESEARCH OF INFORMATION SECURITY PROVISION METHODS IN A VIRTUAL ENVIRONMENT
Rostyslav Tsekhmeister, Artem Platonenko, Maksym Vorokhob , Vyacheslav Cherevyk, Svitlana Semeniaka
63-71
Abstract views: 173 | PDF Downloads: 80
DOI:
https://doi.org/10.28925/2663-4023.2025.27.703
PDF (Українська)
SYSTEMATIC ANALYSIS OF DIGITAL TRACES IN THE UNIVERSITY INFORMATION AND EDUCATIONAL SYSTEM
Myroslav Lakhno
72-86
Abstract views: 100 | PDF Downloads: 65
DOI:
https://doi.org/10.28925/2663-4023.2025.27.709
PDF (Українська)
ANALYSIS OF KEY METADATA FOR IDENTIFYING DUPLICATES IN BIBLIOGRAPHIC RECORDS
Oleh Vasylenko
87-99
Abstract views: 128 | PDF Downloads: 72
DOI:
https://doi.org/10.28925/2663-4023.2025.27.700
PDF (Українська)
METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES
Yaroslav Oliinyk, Artem Platonenko, Vyacheslav Cherevyk, Maksym Vorokhob, Yurii Shevchuk
100-108
Abstract views: 228 | PDF Downloads: 87
DOI:
https://doi.org/10.28925/2663-4023.2025.27.705
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN THE GAMEDEV
Olena Trofymenko , Anastasiia Dyka, Yuliia Loboda, Anatoly Tolocknov, Maksym Bondarenko
109-119
Abstract views: 146 | PDF Downloads: 69
DOI:
https://doi.org/10.28925/2663-4023.2025.27.701
PDF (Українська)
CURRENT RESEARCH OF INFORMATION INFLUENCES IN SOCIAL NETWORKS
Oleksandr Tkachenko, Anna Ilyenko, Oleksandr Ulichev, Yelyzaveta Meleshko, Liliia Halata
120-140
Abstract views: 209 | PDF Downloads: 138
DOI:
https://doi.org/10.28925/2663-4023.2025.27.716
PDF (Українська)
DEVELOPMENT OF A METHOD FOR OPTIMIZING SOFTWARE CODE BASED ON A GENETIC ALGORITHM
Vladyslav Shorobura, Bohdan Khudik
141-149
Abstract views: 113 | PDF Downloads: 32
DOI:
https://doi.org/10.28925/2663-4023.2025.27.718
PDF (Українська)
MODERN CYBER THREATS TO CRITICAL INFRASTRUCTURE IN UKRAINE AND THE WORLD
Anna Ilyenko, Valentyna Teliushchenko, Olena Dubchak
150-164
Abstract views: 176 | PDF Downloads: 105
DOI:
https://doi.org/10.28925/2663-4023.2023.27.719
PDF (Українська)
OSINT TECHNOLOGIES AS A THREAT TO STATE CYBERSECURITY
Valeriia Ivkova, Ivan Opirskyy
165-179
Abstract views: 225 | PDF Downloads: 82
DOI:
https://doi.org/10.28925/2663-4023.2025.27.749
PDF (Українська)
INTELLIGENT ENERGY CONSUMPTION MANAGEMENT IN EDGE COMPUTING NETWORKS BASED ON GAME THEORY
Ihor Buchenko
180-192
Abstract views: 105 | PDF Downloads: 55
DOI:
https://doi.org/10.28925/2663-4023.2025.27.732
PDF (Українська)
ELECTROMAGNETIC THREATS IN MODERN CONFLICTS: ANALYSIS OF EW SOURCES CHARACTERISTICS AND THEIR IMPACT ON THE EFFECTIVENESS OF STRIKE SYSTEMS
Roman Bybyk, Ivan Opirskyy
193-204
Abstract views: 113 | PDF Downloads: 65
DOI:
https://doi.org/10.28925/2663-4023.2025.27.748
PDF (Українська)
MECHANISM FOR MANAGING ACCESS TO INFORMATION RESOURCES AT AN ENTERPRISE
Tetiana Kapeliushna, Tetiana Muzhanova, Tetiana Berestiana, Sergii Goloborodko, Diana Prymachenko
205-219
Abstract views: 131 | PDF Downloads: 94
DOI:
https://doi.org/10.28925/2663-4023.2025.27.743
PDF (Українська)
EVALUATION OF THE CRYPTOGRAPHIC QUALITIES OF A DATA SOURCE AUTHENTICATION MODEL BASED ON A STREAM CIPHER
Viktor Korniets
220-232
Abstract views: 104 | PDF Downloads: 33
DOI:
https://doi.org/10.28925/2663-4023.2025.27.752
PDF (Українська)
NEURO-FUZZY SYSTEM FOR DETECTING INTRUSIONS INTO THE INFORMATION NETWORK OF CRITICAL INFRASTRUCTURE
Serhii Toliupa, Andrii Kulko
233-247
Abstract views: 108 | PDF Downloads: 63
DOI:
https://doi.org/10.28925/2663-4023.2025.27.750
PDF (Українська)
REVIEW OF EXISTING METHODS FOR ASSESSING DISINFORMATION RISKS IN THE CONTEXT OF HYBRID WARFARE
Vadym Lavrov, Andrii Dudatyev
248-256
Abstract views: 117 | PDF Downloads: 68
DOI:
https://doi.org/10.28925/2663-4023.2025.27.720
PDF (Українська)
SOFTWARE IMPLEMENTATION OF THE PROBLEM OF OPTIMIZING THE CHOICE OF INFORMATION PROTECTION MEANS BASED ON AN EVOLUTIONARY ALGORITHM
Valerii Lakhno , Olena Kryvoruchko, Yerbolat Kalaman
257-268
Abstract views: 135 | PDF Downloads: 43
DOI:
https://doi.org/10.28925/2663-4023.2025.27.751
PDF (Українська)
The THE GENDER EQUALITY IN CYBERSECURITY
Svitlana Luchyk , Oleksandr, Vitalii, Vasyl Luchyk
269-283
Abstract views: 127 | PDF Downloads: 74
DOI:
https://doi.org/10.28925/2663-4023.2025.27.742
PDF (Українська)
RISKS OF INFORMATION LEAKAGE USING ONLINE MACHINE TRANSLATION SERVICES
Lesya Matvienko , Liubov Khomenko
284-293
Abstract views: 124 | PDF Downloads: 50
DOI:
https://doi.org/10.28925/2663-4023.2025.27.730
PDF
CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM
Oksana Onyshchuk
294-303
Abstract views: 95 | PDF Downloads: 35
DOI:
https://doi.org/10.28925/2663-4023.2025.27.727
PDF (Українська)
INTELLIGENT SYSTEM FOR THE PLACEMENT OF URBAN ENVIRONMENTAL MONITORING STATIONS
Andrii Palyvoda, Adlet Kassymbekov
304-319
Abstract views: 103 | PDF Downloads: 36
DOI:
https://doi.org/10.28925/2663-4023.2025.27.728
PDF (Українська)
PHISHING ATTACKS ON ENCRYPTED MESSENGERS: METHODS, RISKS AND PROTECTION RECOMMENDATIONS (USING THE EXAMPLE OF SIGNAL MESSENGER)
Dmytro Prokopovych-Tkachenko , Volodymyr Zverev, Valeriy Bushkov, Boris Khrushkov
320-328
Abstract views: 128 | PDF Downloads: 71
DOI:
https://doi.org/10.28925/2663-4023.2025.27.734
PDF (Українська)
CLOUD BASED ARCHITECTURE FOR ADAPTIVE LOGGING METHOD IMPLEMENTATION
Illia Suprunenko , Volodymyr Rudnytskyi
329-338
Abstract views: 116 | PDF Downloads: 50
DOI:
https://doi.org/10.28925/2663-4023.2025.27.724
PDF
DISTRIBUTED INFORMATION PROCESSING AND CLOUD SERVICES IN COMMERCE, AN ANALYSIS OF PRIOR RESEARCH
Serhii Fedotov, Alona Desiatko
339-353
Abstract views: 98 | PDF Downloads: 55
DOI:
https://doi.org/10.28925/2663-4023.2025.27.725
PDF (Українська)
EVOLUTION OF THE CRYPTOGRAPHIC STRENGTH OF PSEUDORANDOM NUMBER GENERATORS
Oleh Tsebak , Stepan Voytusik
354-367
Abstract views: 101 | PDF Downloads: 56
DOI:
https://doi.org/10.28925/2663-4023.2025.27.706
PDF (Українська)
GRAPH-BASED ANALYSIS OF INFORMATION FLOWS IN TELEGRAM FOR CYBERSECURITY THREAT DETECTION
Anatolii Chornyi , Iryna Stopochkina
368-380
Abstract views: 339 | PDF Downloads: 51
DOI:
https://doi.org/10.28925/2663-4023.2025.27.746
PDF (Українська)
METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)
Roman Shtonda, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii , Pavlo Kutsaiev
380-389
Abstract views: 94 | PDF Downloads: 43
DOI:
https://doi.org/10.28925/2663-4023.2025.27.737
PDF (Українська)
ANALYSIS OF CURRENT PROBLEMS OF SECURITY OF CORPORATE DATABASES IN THE CONDITIONS OF MODERN INFRASTRUCTURE AND WAYS TO SOLUTION THEM
Yurii Shchavinskyi, Oleksandr Budzynskyi
390-405
Abstract views: 113 | PDF Downloads: 78
DOI:
https://doi.org/10.28925/2663-4023.2025.27.726
PDF (Українська)
APPLICATION OF IMPROVED KURAMOTO MODELS FOR IDENTIFYING DISINFORMATION IN SOCIAL NETWORKS
Kateryna Dmytriienko , Nataliia Korshun
406-416
Abstract views: 121 | PDF Downloads: 37
DOI:
https://doi.org/10.28925/2663-4023.2025.27.754
PDF (Українська)
CORRELATIONAL ANALYSIS OF CYBER INCIDENT TYPES IN THE CONTEXT OF INFORMATION TECHNOLOGIES FOR INTERNATIONAL COMMUNICATIONS SECURITY
Oleh Haiduk, Volodymyr Zverev, Hennadii Hulak
417-428
Abstract views: 114 | PDF Downloads: 36
DOI:
https://doi.org/10.28925/2663-4023.2025.27.757
PDF (Українська)
RESEARCH OF ARTIFICIAL INTELLIGENCE TOOLS FOR WORKING WITH DATABASES AND DATA ANALYSIS
Oleksii Smirnov, Liliia Konstantynova, Oksana Konoplitska-Slobodeniuk, Nataliia Kozirova, Nataliia Yakymenko, Oleksandr Dorenskyi , Kostiantyn Buravchenko
429-448
Abstract views: 150 | PDF Downloads: 55
DOI:
https://doi.org/10.28925/2663-4023.2025.27.763
PDF (Українська)
INTELLIGENT RISK ASSESSMENT MODELS IN DISTRIBUTED SYSTEMS BASED ON THE NEURAL NETWORK APPROACH
Dmytro Palko
429-448
Abstract views: 126 | PDF Downloads: 76
DOI:
https://doi.org/10.28925/2663-4023.2025.27.764
PDF (Українська)
A DYNAMIC INTERACTION MODEL OF UNMANNED AERIAL VEHICLES WITH A SENSOR NETWORK FOR ENERGY-EFFICIENT MONITORING
Nadiia Dovzhenko, Pavlo Skladannyi, Yevhen V. Ivanichenko, Oleksii Zhyltsov
466-478
Abstract views: 200 | PDF Downloads: 58
DOI:
https://doi.org/10.28925/2663-4023.2025.27.766
PDF (Українська)
GENERATION OF GRAPHIC OBJECTS IN THE GODOT ENGINE USING PARALLEL COMPUTATION METHOD
Ihor Tovstochub, Olha Zinchenko
479-488
Abstract views: 112 | PDF Downloads: 42
DOI:
https://doi.org/10.28925/2663-4023.2025.27.768
PDF (Українська)
IMPROVED METHOD OF ASSESSING DAMAGE TO THE NATIONAL SECURITY OF UKRAINE IN CASE OF LEAKAGE OF STATE SECRETS
Yurii Dreis
489-521
Abstract views: 111 | PDF Downloads: 45
DOI:
https://doi.org/10.28925/2663-4023.2025.27.771
PDF (Українська)
METHODS FOR ASSESSING INFORMATION SECURITY IN COMMUNICATION NETWORKS
Oleksandr Laptiev, Vitalii Savchenko, Alla Kobozieva, Anatolii Salii, Tymur Kurtseitov
522-533
Abstract views: 117 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2025.27.767
PDF (Українська)
DEVELOPMENT OF MODULAR NEURAL NETWORKS FOR DETECTING DIFFERENT CLASSES OF NETWORK ATTACKS
Pavlo Skladannyi, Yuliia Kostiuk, Svitlana Rzaeva, Yuliia Samoilenko, Tetiana Savchenko
534-548
Abstract views: 220 | PDF Downloads: 85
DOI:
https://doi.org/10.28925/2663-4023.2025.27.772
PDF (Українська)
CYBERSECURITY RISK ASSESSMENT FOR SELECTING A CLOUD SERVICE PROVIDER
Mykhailo Khomchak
549-559
Abstract views: 116 | PDF Downloads: 43
DOI:
https://doi.org/10.28925/2663-4023.2025.27.773
PDF (Українська)
MODEL OF ENSURING THE STABILITY OF CRITICAL INFORMATION SYSTEMS UNDER THE INFLUENCE OF INTERNAL AND EXTERNAL DESTABILIZING FACTORS
Viktoriia Sydorenko, Andrii Maksymets
560-571
Abstract views: 109 | PDF Downloads: 51
DOI:
https://doi.org/10.28925/2663-4023.2025.27.779
PDF (Українська)
SYSTEMATIC APPROACH TO SOLVING THE TASK OF PROTECTING INFORMATION IN THE INFOCOMMUNICATION NETWORK FROM THE INFLUENCE OF COMPUTER VIRUSES
Ivan Chernihivskyi, Larysa Kriuchkova
572-590
Abstract views: 111 | PDF Downloads: 39
DOI:
https://doi.org/10.28925/2663-4023.2025.27.781
PDF (Українська)
INFORMATION TECHNOLOGIES FOR REAL-TIME MONITORING OF HETEROGENEOUS NETWORKS
Viktoriia Zhebka
591-603
Abstract views: 85 | PDF Downloads: 62
DOI:
https://doi.org/10.28925/2663-4023.2025.27.787
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue