Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 5 (2019): Cybersecurity: Education, Science, Technique
Vol. 1 No. 5 (2019): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2019.5
Published:
2019-09-26
Title
Title
1-3
Abstract views: 152 | PDF Downloads: 181
PDF (Українська)
Content
Content
4-5
Abstract views: 174 | PDF Downloads: 142
PDF (Українська)
Articles
RESEARCH OF MAIN TRENDS OF MODERN WEB SITES DEVELOPMENT
Nataliia Kotenko, Tetiana Zhyrova, Vitalii Chybaievskyi, Alona Desiatko
6-15
Abstract views: 737 | PDF Downloads: 761
DOI:
https://doi.org/10.28925/2663-4023.2019.5.615
PDF (Українська)
COMPARATIVE BANDWIDTH ANALYSIS OF LOW-POWER WIRELESS IOT-SWITCHES
Volodymyr Sokolov, Bohdan Vovkotrub, Yevhen Zotkin
16-30
Abstract views: 428 | PDF Downloads: 304
DOI:
https://doi.org/10.28925/2663-4023.2019.5.1630
PDF (Українська)
MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY
Svitlana Shevchenko, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, Kateryna Kravchuk
31-39
Abstract views: 813 | PDF Downloads: 391
DOI:
https://doi.org/10.28925/2663-4023.2019.5.3139
PDF (Українська)
MATHEMATICAL MODEL OF AUTHENTICATION OF A TRANSMITTED MESSAGE BASED ON A MCELIECE SCHEME ON SHORTED AND EXTENDED MODIFIED ELLIPTIC CODES USING UMAC MODIFIED ALGORITHM
Alla Havrylova, Olha Korol, Stanyslav Milevskyi, Lala Bakirova
40-51
Abstract views: 313 | PDF Downloads: 171
DOI:
https://doi.org/10.28925/2663-4023.2019.5.4051
PDF
CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE
Zoreslava Brzhevska, Nadiia Dovzhenko, Halyna Haidur, Andriy Anosov
53-60
Abstract views: 3002 | PDF Downloads: 1881
DOI:
https://doi.org/10.28925/2663-4023.2019.5.5260
PDF (Українська)
DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 1
Yurii Borsukovskyi
61-72
Abstract views: 497 | PDF Downloads: 343
DOI:
https://doi.org/10.28925/2663-4023.2019.5.6172
PDF (Українська)
PROTECTED CABLE INTERFACES OF THE SENSORY NETWORKS OF THINGS INTERNET.
Vadym Abramov
73-82
Abstract views: 394 | PDF Downloads: 311
DOI:
https://doi.org/10.28925/2663-4023.2019.5.7382
PDF (Українська)
STATISTICAL CRITERIA FOR ASSESSING THE INFORMATIVITY OF THE SOURCES OF RADIO EMISSION OF TELECOMMUNICATION NETWORKS AND SYSTEMS IN THEIR RECOGNITION
Anatolii Ilnitskiy, Oleg Burba
83-94
Abstract views: 498 | PDF Downloads: 249
DOI:
https://doi.org/10.28925/2663-4023.2019.5.8394
PDF (Українська)
THE RESEARCH TO THE ROBUSTNESS OF RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING TO INFORMATION ATTACKS
Yelyzaveta Meleshko, Vitaliy Khokh, Oleksandr Ulichev
95-104
Abstract views: 633 | PDF Downloads: 339
DOI:
https://doi.org/10.28925/2663-4023.2019.5.95104
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue