Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 22 (2023): Cybersecurity: Education, Science, Technique
Vol. 2 No. 22 (2023): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2023.22
Published:
2023-12-28
Title
Title
PDF (Українська)
Content
Contents
4-5
Abstract views: 40 | PDF Downloads: 37
PDF (Українська)
Articles
THREATS AND RISKS OF THE USE OF ARTIFICIAL INTELLIGENCE
Oleksii Skitsko, Pavlo Skladannyi, Roman Shyrshov, Mykhailo Humeniuk, Maksym Vorokhob
6-18
Abstract views: 3098 | PDF Downloads: 1403
DOI:
https://doi.org/10.28925/2663-4023.2023.22.618
PDF (Українська)
CONSTRUCTION OF AN IMPROVED ENCRYPTION SCHEME ON GENERALIZED SUZUKI 2-GROUPS IN THE MST3 CRYPTOSYSTEM
Yevgen Kotukh, Hennady Khalimov, Maksym Korobchynskyi
19-30
Abstract views: 345 | PDF Downloads: 237
DOI:
https://doi.org/10.28925/2663-4023.2023.22.1930
PDF (Українська)
THE METHOD OF EXCLUSION OF KNOWN SIGNALS WHEN SCANNING A SPECIFIED RADIO RANGE
Oleksandr Laptiev, Serhii Zozulia
31-38
Abstract views: 361 | PDF Downloads: 214
DOI:
https://doi.org/10.28925/2663-4023.2023.22.3138
PDF (Українська)
ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK
Vitalii Chubaievskyi, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, Kyrylo Synelnyk
39-53
Abstract views: 378 | PDF Downloads: 255
DOI:
https://doi.org/10.28925/2663-4023.2023.22.3953
PDF
ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM
Svitlana Lehominova, Halyna Haidur
54-67
Abstract views: 1095 | PDF Downloads: 564
DOI:
https://doi.org/10.28925/2663-4023.2023.22.5467
PDF (Українська)
MODEL FOR CALCULATING THE COSTS OF A BUG BOUNTY PROGRAM FOR TESTING SECURITY VULNERABILITIES
Feodosiy Kipchuk, Volodymyr Sokolov
68-83
Abstract views: 472 | PDF Downloads: 241
DOI:
https://doi.org/10.28925/2663-4023.2023.22.6883
PDF (Українська)
METHOD OF LOW-RESOURCE HASHING TYPE "DATA – GENERATOR"
Vitalii Seleznov, Volodymyr Luzhetskyi
84-95
Abstract views: 342 | PDF Downloads: 292
DOI:
https://doi.org/10.28925/2663-4023.2023.22.8495
PDF (Українська)
ANALYSIS OF THE PROBLEMS OF USING EXISTING WEB VULNERABILITY STANDARDS
Petro Petriv, Ivan Opirskyy
96-112
Abstract views: 488 | PDF Downloads: 347
DOI:
https://doi.org/10.28925/2663-4023.2023.22.96112
PDF (Українська)
РОЗРОБКА МЕТОДИКИ ВИПРОБУВАНЬ БІБЛІОТЕКИ КРИПТОГРАФІЧНИХ ПЕРЕТВОРЮВАНЬ НА ПРИКЛАДІ КРИПТОСИСТЕМИ MST3 НА ОСНОВІ УЗАГАЛЬНЕНИХ СУЗУКІ 2-ГРУП
Yevgen Kotukh, Oleksandr Marukhnenko, Hennadii Khalimov, Maksym Korobchynskyi
113-121
Abstract views: 310 | PDF Downloads: 211
DOI:
https://doi.org/10.28925/2663-4023.2023.22.113121
PDF (Українська)
PRACTICAL APPROACHES TO ORGANIZING SECURE DATA TRANSFER VIA TLS PROTOCOL USING OPENSSL MEANS
Anna Ilyenko, Sergii Ilyenko, Olena Prokopenko, Iryna Kravchuk
122-133
Abstract views: 378 | PDF Downloads: 222
DOI:
https://doi.org/10.28925/2663-4023.2023.22.122133
PDF
SELF-DIAGNOSIS AS A WAY TO INCREASE THE CYBER RESISTANCE OF TERMINAL COMPONENTS OF A TECHNOLOGICAL SYSTEM
Serhii Toliupa, Yurii Samokhvalov, Pavlo Khusainov, Serhii Shtanenko
134-147
Abstract views: 393 | PDF Downloads: 244
DOI:
https://doi.org/10.28925/2663-4023.2023.22.134147
PDF (Українська)
ANALYSIS OF METHODS FOR DETECTING MISINFORMATION IN SOCIAL NETWORKS USING MACHINE LEARNING
Maksym Martseniuk, Valerii Kozachok, Oleksandr Bohdanov, Ievgen Iosifov, Zoreslava Brzhevska
148-155
Abstract views: 1267 | PDF Downloads: 124
DOI:
https://doi.org/10.28925/2663-4023.2023.22.148155
PDF (Українська)
RESEARCH OF DEVELOPMENT AND INNOVATION OF CYBER PROTECTION AT CRITICAL INFRASTRUCTURE FACILITIES
Yana Mashtaliar, Valerii Kozachok, Zoreslava Brzhevska, Oleksandr Bohdanov, Iryna Oksanych, Валерій Литвинов
156-167
Abstract views: 980 | PDF Downloads: 155
DOI:
https://doi.org/10.28925/2663-4023.2023.22.156167
PDF (Українська)
GAME THEORETICAL APPROACH TO THE MODELING OF CONFLICTS IN INFORMATION SECURITY SYSTEMS
Svitlana Shevchenko, Yuliia Zhdanovа, Pavlo Skladannyi, Sofia Boiko
168-178
Abstract views: 681 | PDF Downloads: 335
DOI:
https://doi.org/10.28925/2663-4023.2023.22.168178
PDF (Українська)
ZERO TRUST CONCEPT FOR ACTIVE DIRECTORY PROTECTION TO DETECT RANSOMWARE
Danyil Zhuravchak, Pavlo Hlushchenko, Maksym Opanovych, Valerii Dudykevych, Andrian Piskozub
179-190
Abstract views: 460 | PDF Downloads: 306
DOI:
https://doi.org/10.28925/2663-4023.2023.22.179190
PDF (Українська)
GENERATION OF PSEUDORANDOM SEQUENCES ON MICROCONTROLLERS WITH LIMITED COMPUTATIONAL RESOURCES, ENTROPY SOURCES, AND STATISTICAL PROPERTIES TESTING
Roman Chernenko
191-203
Abstract views: 418 | PDF Downloads: 253
DOI:
https://doi.org/10.28925/2663-4023.2023.22.191203
PDF (Українська)
MODEL OF IMPLEMENTATION OF ELECTRONIC COMMERCE TECHNOLOGIES
Oleksandr Kharchenko, Valentyn Yaremych
204-213
Abstract views: 382 | PDF Downloads: 314
DOI:
https://doi.org/10.28925/2663-4023.2023.22.2042013
PDF (Українська)
ENSURING THE SECURITY OF CORPORATE USERS ACCOUNTS
Ivan Tyshyk
214-225
Abstract views: 279 | PDF Downloads: 187
DOI:
https://doi.org/10.28925/2663-4023.2023.22.214225
PDF (Українська)
EXPLORING THE BENEFITS OF CROSS-IMPLEMENTING CYBERSECURITY STANDARDS TO COMBAT RANSOMWARE CYBER CRIMES
Valeriy Dudykevych, Oleh Harasymchuk, Andrii Partyka , Yaroslav Sovyn, Elena Nyemkova
226-237
Abstract views: 456 | PDF Downloads: 252
DOI:
https://doi.org/10.28925/2663-4023.2023.22.226237
PDF (Українська)
METHOD FOR ADAPTING RECURSIVE SYSTEMATIC CONVOLUTIONAL CODES OF TURBO CODES BY BYPASSING THE NODES OF THE SPATIAL GRID
Kurbet Pavlo, Liliia Zaitseva
238-248
Abstract views: 276 | PDF Downloads: 86
DOI:
https://doi.org/10.28925/2663-4023.2023.22.238248
PDF (Українська)
METHODOLOGY FOR THE DEVELOPMENT OF EDUCATIONAL DIGITAL RESOURCES IN THE FORM OF ONLINE GAMES
Olena Skliarenko, Denys Pokydko
249-256
Abstract views: 201 | PDF Downloads: 86
DOI:
https://doi.org/10.28925/2663-4023.2023.22.249256
PDF (Українська)
ANTHROPOMORPHIC NETWORKS AS REPRESENTATIVES OF GLOBAL CONSCIOUSNESS
Serhii Yahodzinskyi , Volodumur Kotsun
257-263
Abstract views: 143 | PDF Downloads: 70
DOI:
https://doi.org/10.28925/2663-4023.2023.22.257263
PDF (Українська)
DEVELOPMENT OF A CORPORATE EDUCATIONAL INFORMATION SYSTEM WITH THE HELP OF MACHINE LEARNING METHODS AND METHODS OF ENSURING INFORMATION SECURITY
Oleksiy Ananchenko
264-273
Abstract views: 177 | PDF Downloads: 78
DOI:
https://doi.org/10.28925/2663-4023.2023.22.264273
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue