Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 27 (2025): Cybersecurity: Education, Science, Technique
Vol. 3 No. 27 (2025): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2025.27
Published:
2025-03-27
Articles
APPLICATION OF LARGE LANGUAGE MODELS FOR BUILDING A “FOREST OF TERM HIERARCHIES”
Olexandr Puchkov, Dmytro Lande, Ihor Subach
6-21
Abstract views: 551 | PDF Downloads: 354
DOI:
https://doi.org/10.28925/2663-4023.2025.27.712
PDF (Українська)
THE METHODOLOGY FOR PROTECTING GRID ENVIRONMENTS FROM MALICIOUS CODE DURING THE EXECUTION OF COMPUTATIONAL TASKS
Yuliia Kostiuk, Nadiia Dovzhenko, Nataliia Mazur, Pavlo Skladannyi, Svitlana Rzaeva
22-40
Abstract views: 806 | PDF Downloads: 246
DOI:
https://doi.org/10.28925/2663-4023.2025.27.710
PDF (Українська)
THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE
Arkadii Chikrii, Ihor Martyniuk, Alona Desiatko, Inna Malyukova, Roman Shyrshov
41-53
Abstract views: 526 | PDF Downloads: 241
DOI:
https://doi.org/10.28925/2663-4023.2025.27.714
PDF (Українська)
ANALYSIS OF MACHINE LEARNING METHODS FOR AUTOMATING PENETRATION TESTING
Anastasiia Zhuravchak, Andriian Piskozub
54-62
Abstract views: 476 | PDF Downloads: 354
DOI:
https://doi.org/10.28925/2663-4023.2025.27.711
PDF (Українська)
RESEARCH OF INFORMATION SECURITY PROVISION METHODS IN A VIRTUAL ENVIRONMENT
Rostyslav Tsekhmeister, Artem Platonenko, Maksym Vorokhob , Vyacheslav Cherevyk, Svitlana Semeniaka
63-71
Abstract views: 596 | PDF Downloads: 245
DOI:
https://doi.org/10.28925/2663-4023.2025.27.703
PDF (Українська)
SYSTEMATIC ANALYSIS OF DIGITAL TRACES IN THE UNIVERSITY INFORMATION AND EDUCATIONAL SYSTEM
Myroslav Lakhno
72-86
Abstract views: 357 | PDF Downloads: 205
DOI:
https://doi.org/10.28925/2663-4023.2025.27.709
PDF (Українська)
ANALYSIS OF KEY METADATA FOR IDENTIFYING DUPLICATES IN BIBLIOGRAPHIC RECORDS
Oleh Vasylenko
87-99
Abstract views: 347 | PDF Downloads: 192
DOI:
https://doi.org/10.28925/2663-4023.2025.27.700
PDF (Українська)
METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES
Yaroslav Oliinyk, Artem Platonenko, Vyacheslav Cherevyk, Maksym Vorokhob, Yurii Shevchuk
100-108
Abstract views: 1024 | PDF Downloads: 306
DOI:
https://doi.org/10.28925/2663-4023.2025.27.705
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN THE GAMEDEV
Olena Trofymenko , Anastasiia Dyka, Yuliia Loboda, Anatoly Tolocknov, Maksym Bondarenko
109-119
Abstract views: 555 | PDF Downloads: 355
DOI:
https://doi.org/10.28925/2663-4023.2025.27.701
PDF (Українська)
CURRENT RESEARCH OF INFORMATION INFLUENCES IN SOCIAL NETWORKS
Oleksandr Tkachenko, Anna Ilyenko, Oleksandr Ulichev, Yelyzaveta Meleshko, Liliia Halata
120-140
Abstract views: 804 | PDF Downloads: 475
DOI:
https://doi.org/10.28925/2663-4023.2025.27.716
PDF (Українська)
DEVELOPMENT OF A METHOD FOR OPTIMIZING SOFTWARE CODE BASED ON A GENETIC ALGORITHM
Vladyslav Shorobura, Bohdan Khudik
141-149
Abstract views: 333 | PDF Downloads: 168
DOI:
https://doi.org/10.28925/2663-4023.2025.27.718
PDF (Українська)
MODERN CYBER THREATS TO CRITICAL INFRASTRUCTURE IN UKRAINE AND THE WORLD
Anna Ilyenko, Valentyna Teliushchenko, Olena Dubchak
150-164
Abstract views: 962 | PDF Downloads: 461
DOI:
https://doi.org/10.28925/2663-4023.2023.27.719
PDF (Українська)
OSINT TECHNOLOGIES AS A THREAT TO STATE CYBERSECURITY
Valeriia Ivkova, Ivan Opirskyy
165-179
Abstract views: 1352 | PDF Downloads: 495
DOI:
https://doi.org/10.28925/2663-4023.2025.27.749
PDF (Українська)
INTELLIGENT ENERGY CONSUMPTION MANAGEMENT IN EDGE COMPUTING NETWORKS BASED ON GAME THEORY
Ihor Buchenko
180-192
Abstract views: 374 | PDF Downloads: 261
DOI:
https://doi.org/10.28925/2663-4023.2025.27.732
PDF (Українська)
ELECTROMAGNETIC THREATS IN MODERN CONFLICTS: ANALYSIS OF EW SOURCES CHARACTERISTICS AND THEIR IMPACT ON THE EFFECTIVENESS OF STRIKE SYSTEMS
Roman Bybyk, Ivan Opirskyy
193-204
Abstract views: 627 | PDF Downloads: 471
DOI:
https://doi.org/10.28925/2663-4023.2025.27.748
PDF (Українська)
MECHANISM FOR MANAGING ACCESS TO INFORMATION RESOURCES AT AN ENTERPRISE
Tetiana Kapeliushna, Tetiana Muzhanova, Tetiana Berestiana, Sergii Goloborodko, Diana Prymachenko
205-219
Abstract views: 483 | PDF Downloads: 292
DOI:
https://doi.org/10.28925/2663-4023.2025.27.743
PDF (Українська)
EVALUATION OF THE CRYPTOGRAPHIC QUALITIES OF A DATA SOURCE AUTHENTICATION MODEL BASED ON A STREAM CIPHER
Viktor Korniets
220-232
Abstract views: 310 | PDF Downloads: 168
DOI:
https://doi.org/10.28925/2663-4023.2025.27.752
PDF (Українська)
NEURO-FUZZY SYSTEM FOR DETECTING INTRUSIONS INTO THE INFORMATION NETWORK OF CRITICAL INFRASTRUCTURE
Serhii Toliupa, Andrii Kulko
233-247
Abstract views: 422 | PDF Downloads: 254
DOI:
https://doi.org/10.28925/2663-4023.2025.27.750
PDF (Українська)
REVIEW OF EXISTING METHODS FOR ASSESSING DISINFORMATION RISKS IN THE CONTEXT OF HYBRID WARFARE
Vadym Lavrov, Andrii Dudatyev
248-256
Abstract views: 412 | PDF Downloads: 187
DOI:
https://doi.org/10.28925/2663-4023.2025.27.720
PDF (Українська)
SOFTWARE IMPLEMENTATION OF THE PROBLEM OF OPTIMIZING THE CHOICE OF INFORMATION PROTECTION MEANS BASED ON AN EVOLUTIONARY ALGORITHM
Valerii Lakhno , Olena Kryvoruchko, Yerbolat Kalaman
257-268
Abstract views: 568 | PDF Downloads: 185
DOI:
https://doi.org/10.28925/2663-4023.2025.27.751
PDF (Українська)
The THE GENDER EQUALITY IN CYBERSECURITY
Svitlana Luchyk , Oleksandr, Vitalii, Vasyl Luchyk
269-283
Abstract views: 377 | PDF Downloads: 218
DOI:
https://doi.org/10.28925/2663-4023.2025.27.742
PDF (Українська)
RISKS OF INFORMATION LEAKAGE USING ONLINE MACHINE TRANSLATION SERVICES
Lesya Matvienko , Liubov Khomenko
284-293
Abstract views: 399 | PDF Downloads: 192
DOI:
https://doi.org/10.28925/2663-4023.2025.27.730
PDF
CYBERSECURITY OF MQTT CONNECTIONS IN AN AUTOMATED GATE CONTROL SYSTEM
Oksana Onyshchuk
294-303
Abstract views: 378 | PDF Downloads: 177
DOI:
https://doi.org/10.28925/2663-4023.2025.27.727
PDF (Українська)
INTELLIGENT SYSTEM FOR THE PLACEMENT OF URBAN ENVIRONMENTAL MONITORING STATIONS
Andrii Palyvoda, Adlet Kassymbekov
304-319
Abstract views: 219 | PDF Downloads: 141
DOI:
https://doi.org/10.28925/2663-4023.2025.27.728
PDF (Українська)
PHISHING ATTACKS ON ENCRYPTED MESSENGERS: METHODS, RISKS AND PROTECTION RECOMMENDATIONS (USING THE EXAMPLE OF SIGNAL MESSENGER)
Dmytro Prokopovych-Tkachenko , Volodymyr Zverev, Valeriy Bushkov, Boris Khrushkov
320-328
Abstract views: 465 | PDF Downloads: 245
DOI:
https://doi.org/10.28925/2663-4023.2025.27.734
PDF (Українська)
CLOUD BASED ARCHITECTURE FOR ADAPTIVE LOGGING METHOD IMPLEMENTATION
Illia Suprunenko , Volodymyr Rudnytskyi
329-338
Abstract views: 314 | PDF Downloads: 193
DOI:
https://doi.org/10.28925/2663-4023.2025.27.724
PDF
DISTRIBUTED INFORMATION PROCESSING AND CLOUD SERVICES IN COMMERCE, AN ANALYSIS OF PRIOR RESEARCH
Serhii Fedotov, Alona Desiatko
339-353
Abstract views: 389 | PDF Downloads: 188
DOI:
https://doi.org/10.28925/2663-4023.2025.27.725
PDF (Українська)
EVOLUTION OF THE CRYPTOGRAPHIC STRENGTH OF PSEUDORANDOM NUMBER GENERATORS
Oleh Tsebak , Stepan Voytusik
354-367
Abstract views: 254 | PDF Downloads: 246
DOI:
https://doi.org/10.28925/2663-4023.2025.27.706
PDF (Українська)
GRAPH-BASED ANALYSIS OF INFORMATION FLOWS IN TELEGRAM FOR CYBERSECURITY THREAT DETECTION
Anatolii Chornyi , Iryna Stopochkina
368-380
Abstract views: 911 | PDF Downloads: 216
DOI:
https://doi.org/10.28925/2663-4023.2025.27.746
PDF (Українська)
METHODOLOGY FOR TESTING THE CAPABILITIES OF SOFTWARE SOLUTIONS ENDPOINT DETECTION AND RESPONSE (EXTENDED DETECTION AND RESPONSE)
Roman Shtonda, Oleksii Cherednychenko, Denys Fomkin, Olena Bokii , Pavlo Kutsaiev
380-389
Abstract views: 363 | PDF Downloads: 161
DOI:
https://doi.org/10.28925/2663-4023.2025.27.737
PDF (Українська)
ANALYSIS OF CURRENT PROBLEMS OF SECURITY OF CORPORATE DATABASES IN THE CONDITIONS OF MODERN INFRASTRUCTURE AND WAYS TO SOLUTION THEM
Yurii Shchavinskyi, Oleksandr Budzynskyi
390-405
Abstract views: 409 | PDF Downloads: 247
DOI:
https://doi.org/10.28925/2663-4023.2025.27.726
PDF (Українська)
APPLICATION OF IMPROVED KURAMOTO MODELS FOR IDENTIFYING DISINFORMATION IN SOCIAL NETWORKS
Kateryna Dmytriienko , Nataliia Korshun
406-416
Abstract views: 370 | PDF Downloads: 153
DOI:
https://doi.org/10.28925/2663-4023.2025.27.754
PDF (Українська)
CORRELATIONAL ANALYSIS OF CYBER INCIDENT TYPES IN THE CONTEXT OF INFORMATION TECHNOLOGIES FOR INTERNATIONAL COMMUNICATIONS SECURITY
Oleh Haiduk, Volodymyr Zverev, Hennadii Hulak
417-428
Abstract views: 484 | PDF Downloads: 126
DOI:
https://doi.org/10.28925/2663-4023.2025.27.757
PDF (Українська)
RESEARCH OF ARTIFICIAL INTELLIGENCE TOOLS FOR WORKING WITH DATABASES AND DATA ANALYSIS
Oleksii Smirnov, Liliia Konstantynova, Oksana Konoplitska-Slobodeniuk, Nataliia Kozirova, Nataliia Yakymenko, Oleksandr Dorenskyi , Kostiantyn Buravchenko
429-448
Abstract views: 519 | PDF Downloads: 250
DOI:
https://doi.org/10.28925/2663-4023.2025.27.763
PDF (Українська)
INTELLIGENT RISK ASSESSMENT MODELS IN DISTRIBUTED SYSTEMS BASED ON THE NEURAL NETWORK APPROACH
Dmytro Palko
429-448
Abstract views: 438 | PDF Downloads: 286
DOI:
https://doi.org/10.28925/2663-4023.2025.27.764
PDF (Українська)
A DYNAMIC INTERACTION MODEL OF UNMANNED AERIAL VEHICLES WITH A SENSOR NETWORK FOR ENERGY-EFFICIENT MONITORING
Nadiia Dovzhenko, Pavlo Skladannyi, Yevhen V. Ivanichenko, Oleksii Zhyltsov
466-478
Abstract views: 600 | PDF Downloads: 187
DOI:
https://doi.org/10.28925/2663-4023.2025.27.766
PDF (Українська)
GENERATION OF GRAPHIC OBJECTS IN THE GODOT ENGINE USING PARALLEL COMPUTATION METHOD
Ihor Tovstochub, Olha Zinchenko
479-488
Abstract views: 308 | PDF Downloads: 179
DOI:
https://doi.org/10.28925/2663-4023.2025.27.768
PDF (Українська)
IMPROVED METHOD OF ASSESSING DAMAGE TO THE NATIONAL SECURITY OF UKRAINE IN CASE OF LEAKAGE OF STATE SECRETS
Yurii Dreis
489-521
Abstract views: 369 | PDF Downloads: 179
DOI:
https://doi.org/10.28925/2663-4023.2025.27.771
PDF (Українська)
METHODS FOR ASSESSING INFORMATION SECURITY IN COMMUNICATION NETWORKS
Oleksandr Laptiev, Vitalii Savchenko, Alla Kobozieva, Anatolii Salii, Tymur Kurtseitov
522-533
Abstract views: 457 | PDF Downloads: 197
DOI:
https://doi.org/10.28925/2663-4023.2025.27.767
PDF (Українська)
DEVELOPMENT OF MODULAR NEURAL NETWORKS FOR DETECTING DIFFERENT CLASSES OF NETWORK ATTACKS
Pavlo Skladannyi, Yuliia Kostiuk, Svitlana Rzaeva, Yuliia Samoilenko, Tetiana Savchenko
534-548
Abstract views: 774 | PDF Downloads: 237
DOI:
https://doi.org/10.28925/2663-4023.2025.27.772
PDF (Українська)
CYBERSECURITY RISK ASSESSMENT FOR SELECTING A CLOUD SERVICE PROVIDER
Mykhailo Khomchak
549-559
Abstract views: 316 | PDF Downloads: 192
DOI:
https://doi.org/10.28925/2663-4023.2025.27.773
PDF (Українська)
MODEL OF ENSURING THE STABILITY OF CRITICAL INFORMATION SYSTEMS UNDER THE INFLUENCE OF INTERNAL AND EXTERNAL DESTABILIZING FACTORS
Viktoriia Sydorenko, Andrii Maksymets
560-571
Abstract views: 409 | PDF Downloads: 180
DOI:
https://doi.org/10.28925/2663-4023.2025.27.779
PDF (Українська)
SYSTEMATIC APPROACH TO SOLVING THE TASK OF PROTECTING INFORMATION IN THE INFOCOMMUNICATION NETWORK FROM THE INFLUENCE OF COMPUTER VIRUSES
Ivan Chernihivskyi, Larysa Kriuchkova
572-590
Abstract views: 386 | PDF Downloads: 165
DOI:
https://doi.org/10.28925/2663-4023.2025.27.781
PDF (Українська)
INFORMATION TECHNOLOGIES FOR REAL-TIME MONITORING OF HETEROGENEOUS NETWORKS
Viktoriia Zhebka
591-603
Abstract views: 356 | PDF Downloads: 258
DOI:
https://doi.org/10.28925/2663-4023.2025.27.787
PDF (Українська)
MATHEMATICAL MODEL AND ALGORITHMIZATION OF FUNCTIONS OF THE COMPUTING CORE OF AN INTELLIGENT INTERNAL AUDIT SUPPORT SYSTEM
Dmytro Hnatchenko, Alona Desiatko
604-616
Abstract views: 416 | PDF Downloads: 136
DOI:
https://doi.org/10.28925/2663-4023.2025.27.604616
PDF (Українська)
IMPROVEMENT OF THE ALGORITHM FOR RESTORING THE LINGUISTIC COMPONENT OF SPEECH INFORMATION USING THE PHONEME–FORMANT METHOD FOR ASSESSING ITS SECURITY LEVEL
Serhii Nuzhnyi
Abstract views: 101 | PDF Downloads: 55
DOI:
https://doi.org/10.28925/2663-4023.2025.27.617632
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue