Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 5 (2019): Cybersecurity: Education, Science, Technique
Vol. 1 No. 5 (2019): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2019.5
Published:
2019-09-26
Title
Title
1-3
Abstract views: 166 | PDF Downloads: 185
PDF (Українська)
Content
Content
4-5
Abstract views: 185 | PDF Downloads: 145
PDF (Українська)
Articles
RESEARCH OF MAIN TRENDS OF MODERN WEB SITES DEVELOPMENT
Nataliia Kotenko, Tetiana Zhyrova, Vitalii Chybaievskyi, Alona Desiatko
6-15
Abstract views: 839 | PDF Downloads: 815
DOI:
https://doi.org/10.28925/2663-4023.2019.5.615
PDF (Українська)
COMPARATIVE BANDWIDTH ANALYSIS OF LOW-POWER WIRELESS IOT-SWITCHES
Volodymyr Sokolov, Bohdan Vovkotrub, Yevhen Zotkin
16-30
Abstract views: 583 | PDF Downloads: 326
DOI:
https://doi.org/10.28925/2663-4023.2019.5.1630
PDF (Українська)
MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY
Svitlana Shevchenko, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, Kateryna Kravchuk
31-39
Abstract views: 1123 | PDF Downloads: 437
DOI:
https://doi.org/10.28925/2663-4023.2019.5.3139
PDF (Українська)
MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM
Alla Havrylova, Olha Korol, Stanyslav Milevskyi, Lala Bakirova
40-51
Abstract views: 345 | PDF Downloads: 194
DOI:
https://doi.org/10.28925/2663-4023.2019.5.4051
PDF
CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE
Zoreslava Brzhevska, Nadiia Dovzhenko, Halyna Haidur, Andriy Anosov
53-60
Abstract views: 3597 | PDF Downloads: 2097
DOI:
https://doi.org/10.28925/2663-4023.2019.5.5260
PDF (Українська)
DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 1
Yurii Borsukovskyi
61-72
Abstract views: 543 | PDF Downloads: 382
DOI:
https://doi.org/10.28925/2663-4023.2019.5.6172
PDF (Українська)
PROTECTED CABLE INTERFACES OF THE SENSORY NETWORKS OF THINGS INTERNET.
Vadym Abramov
73-82
Abstract views: 422 | PDF Downloads: 330
DOI:
https://doi.org/10.28925/2663-4023.2019.5.7382
PDF (Українська)
STATISTICAL CRITERIA FOR ASSESSING THE INFORMATIVITY OF THE SOURCES OF RADIO EMISSION OF TELECOMMUNICATION NETWORKS AND SYSTEMS IN THEIR RECOGNITION
Anatolii Ilnitskiy, Oleg Burba
83-94
Abstract views: 537 | PDF Downloads: 270
DOI:
https://doi.org/10.28925/2663-4023.2019.5.8394
PDF (Українська)
THE RESEARCH TO THE ROBUSTNESS OF RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING TO INFORMATION ATTACKS
Yelyzaveta Meleshko, Vitaliy Khokh, Oleksandr Ulichev
95-104
Abstract views: 673 | PDF Downloads: 355
DOI:
https://doi.org/10.28925/2663-4023.2019.5.95104
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue