Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 4 No. 32 (2026): Cybersecurity: Education, Science, Technique
Vol. 4 No. 32 (2026): Cybersecurity: Education, Science, Technique
НОМЕР В ПРОЦЕСІ ЗАВАНТАЖЕННЯ НА САЙТ.
DOI:
https://doi.org/10.28925/2663-4023.2026.32
Published:
2026-03-26
Articles
USING INDICATORS OF COMPROMISE FOR CYBERATTACK DETECTION
Nataliia Cherniiashchuk
8-19
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1034
PDF (Українська)
FORMAL MODEL OF ADAPTIVE SELECTION OF CRYPTOGRAPHIC PARAMETERS FOR CHANNEL PROTECTION IN CORPORATE COMPUTER NETWORKS BASED ON DYNAMIC TRUST ASSESSMENT
Yuliia Kostiuk, Pavlo Skladannyi, Nataliia Mazur , Svitlana Rzaeva , Dmytro Hnatchenko, Ihor Honcharenko
20-44
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1111
PDF (Українська)
CREATION OF AN AUTOMATED INFORMATION PROCESSING SYSTEM WITH RESTRICTED ACCESS “INTERNET OF THINGS IN A ‘SMART CITY’: THREATS – SECURITY TECHNOLOGIES” IN THE INDUSTRY 4.0 SPACE
Valerii Dudykevych, Halyna Mykytyn, Yaroslava Parchuk, Maksym-Stepan Terpeliuk
45-70
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.917
PDF (Українська)
FEATURES OF MODERN STATE-SUPPORTED CYBEROPERATIONS AS A NEW FORM OF INTERSTATE CONFRONTATION
Tetiana Muzhanova, Svitlana Lehominova, Tetiana Kapeliushna, Yurii Shchavinsky, Mykhailo Zaporozhchenko
71-89
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1116
PDF (Українська)
RISK CRITERIA AND ML ALGORITHMS FOR THREAT DETECTION IN A CLOUD ENVIRONMENT
Aziz Abibulaiev, Andrian Piskozub, Edem Atamuratov
90-118
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1185
PDF (Українська)
EXPERIMENTAL EVALUATION OF THE EFFECTIVENESS OF HYBRID METHODS FOR DIGITAL FOOTPRINT ANALYSIS IN DETECTING ATYPICAL BEHAVIOR IN INFORMATION AND EDUCATIONAL SYSTEMS
Myroslav Lakhno
119-126
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1109
PDF (Українська)
RESEARCH ON SPATIAL-FREQUENCY METHODS OF FILTERING AND JAMMING SUPPRESSION IN ELECTRONIC WARFARE COUNTERMEASURE SYSTEMS
Roman Bybyk, Artem Stefankiv
127-140
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1186
PDF (Українська)
PHISHING DETECTION IN ELECTRONIC COMMUNICATION CHANNELS
Ihor Tereikovskyi, Liudmyla Tereikovska
141-153
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1092
PDF (Українська)
SECURITY-AS-CODE APPROACH FOR AUTOMATING PCI DSS COMPLIANCE USING AUTONOMOUS AGENTS BASED ON LARGE LANGUAGE MODELS
Oleksandr Vakhula, Dmytro Marchuk
154-171
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1187
PDF (Українська)
DEVELOPMENT OF METHODS FOR DETECTION OF FAKE NEWS BASED ON GRAPH THEORY ANALYSIS
Mariia Nazarkevych, Danyil Korotych, Roman Cholkan
172-187
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1110
PDF (Українська)
EXTENSION OF OPEN POLICY AGENT FUNCTIONS USING FALCO
Dmytro Darienko, Nazariy Kohut
188-197
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1188
PDF (Українська)
MULTI-AGENT APPROACH TO DATA PIPELINE STABILITY USING DISTRIBUTED STORAGE COORDINATION
Yuliia Loboda, Olena Trofymenko , Ihor Mykheliev, Oksana Haidaienko, Mykhaylo Vorona
198-213
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1104
PDF (Українська)
DESIGN OF GRAPHIC HASHES WITH SALT BASED ON THE METHOD OF CODING OF UUID
Yaroslava Momryk
212-226
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1089
PDF (Українська)
INFORMATION SECURITY OF CYBER-PHYSICAL SYSTEMS AS A FACTOR OF SERVICE QUALITY IN THE HOTEL AND RESTAURANT BUSINESS
Orest Polotai, Natalia Kukharska, Bohdana Polotai, Yulia Vityk
227-241
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1103
PDF (Українська)
RESEARCH ON MACHINE LEARNING MODELS FOR TOXIC CONTENT DETECTION
Viktor Kolchenko, Dmytro Sabodashko, Kostiantyn Piataiev, Vladyslav Horodnyk, Ivan Shchudlo, Yuriy Khoma
242-258
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1189
PDF (Українська)
UNSUPERVISED HUMAN EMOTION RECOGNITION VIA BODY POSE DYNAMICS BASED ON SELF-SUPERVISED CONTRASTIVE LEARNING
Tetiana Kysil, Olga Zinchenko
259-274
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1006
PDF (Українська)
METHODS AND MEANS OF PROTECTING CRITICAL INFRASTRUCTURE FROM OSINT INTELLIGENCE IN WARTIME
Valeriia Ivkova, Andrii Leonov
275-288
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1190
PDF (Українська)
DEVELOPMENT OF THE INTERACTIVE INTERFACE OF KORISTUVACH BASED ON DETERMINATIVE END MOORE AUTOMATICS
Anton Kostiuk, Serhiy Zaitsev, Vladislav Vasylenko , Lilia Zaitseva
289-297
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1088
PDF (Українська)
INTEGRATION OF FINOPS AND SOC 2 CONTROLS IN THE SECURITY SYSTEM OF MULTI-CLOUD ENVIRONMENTS
Yevhenii Martseniuk, Oleh Deineka, Oleh Harasymchuk, Taras Lukovskyy
298-335
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1191
PDF (Українська)
DETECTION OF STEGANOGRAPHY IN IMAGES USING LIGHTWEIGHT DEEP LEARNING MODELS
Nataliia Lashchevska, Yurii Mishkur
336-348
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1086
PDF (Українська)
ASSESSING THE IMPACT OF ZERO TRUST ON INCIDENT LOCALIZATION IN CONTAINERIZED MICROSERVICE ENVIRONMENTS
Vitalii Molnar, Oleksii Hrushkovskyi
349-365
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1192
PDF (Українська)
MULTI-LEVEL DATA PROTECTION IN LARAVEL APPLICATIONS
Roman Belous, Oleh Klymenkov
366-375
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1075
PDF (Українська)
ІНТЕГРАЦІЯ ШТУЧНОГО ІНТЕЛЕКТУ В ЖИТТЄВИЙ ЦИКЛ РОЗРОБКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ (SDLC)
Ivan Opirskyy, Maksym Melnychuk
376-404
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1193
PDF (Українська)
QUANTITATIVE ASSESSMENT OF THE QUALITY AND ROBUSTNESS OF SELECTED STEGANOGRAPHIC ALGORITHMS
Tetiana Hryshanovych, Bohdan Butkevych
405-418
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1105
PDF (Українська)
NETWORK ACCESS LIFECYCLE: A STRUCTURED APPROACH TO FIREWALL RULE GOVERNANCE IN ZERO TRUST ENVIRONMENTS
Roman Syrotynskyi, Ivan Tyshyk
419-430
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1194
PDF (Українська)
IMPROVING PASSWORD POLICY AND USING MODERN PASSWORD MANAGERS TO ENHANCE CYBER RESILIENCE OF INFORMATION AND COMMUNICATION SYSTEMS
Roman Shtonda, Roman Zozulia, Olena Bokii
431-447
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1114
PDF (Українська)
MODEL OF AN INCIDENT RESPONSE PLAN FOR INCIDENTS RELATED TO THE USE OF WEAK PSEUDORANDOM NUMBER GENERATORS
Danylo Buhai, Ihor Vlasiuk, Vitalii Susukailo, Yevhenii Kurii
448-462
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1195
PDF (Українська)
SECURITY AUDIT OF LIGHTWEIGHT KUBERNETES CLUSTERS USING MULTICHAIN-BASED TRUST MECHANISMS
Igor Andrushchak, Viktor Kosheliuk
463-477
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1097
PDF (Українська)
RETRIEVAL-AUGMENTED GENERATION FOR FORENSIC LEGAL ANALYSIS: INTEGRATION OF UKRAINIAN CRIMINAL CODE WITH MOBILE DEVICE EVIDENCE
Taras Fedynyshyn, Olha Partyka
478-488
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1196
PDF
TEMPORAL INTERPRETATION OF QUANTUM DECOHERENCE IN INFORMATION SYSTEMS
Andrii Lemeshko, Viktor Krasnoshchok, Alona Desiatko
489-499
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1117
PDF (Українська)
SECURITY OF COMPUTER NETWORKS IN CONDITIONS OF UNCERTAINTY
Volodymyr Akhromovych, Vadym Akhromovych, Volodymyr Sanchenko, Myroslav Areshkov
500-515
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1078
PDF (Українська)
RICE AND ICE MODELS AS TOOLS FOR FORMALIZING PRIORITIZATION OF IT PRODUCT FUNCTIONALITY IN TRAINING FUTURE IT SPECIALISTS
Halyna Kuchakovska, Karyna Khorolska
516-531
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1119
PDF (Українська)
INFORMATION OUTPUT CHANNELS – RESEARCH AND MODELING
Yuliya Chernish, Tetiana Tereshchenko, Katerina Tereshchenko
532-549
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1113
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue