Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 1 (2018): Cybersecurity: Education, Science, Technique
Vol. 1 No. 1 (2018): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2018.1
Published:
2018-09-26
Title
Title
1-3
Abstract views: 419 | PDF Downloads: 327
PDF (Українська)
Content
Contact
4-5
Abstract views: 414 | PDF Downloads: 267
PDF (Українська)
Articles
Method of Counteraction in Social Engineering on Information Activity Objectives
Volodymyr Yu. Sokolov, Davyd M. Kurbanmuradov
6-16
Abstract views: 1521 | PDF Downloads: 732
DOI:
https://doi.org/10.28925/2663-4023.2018.1.616
PDF (Українська)
Terahertz Channel Radio Access for Complex System without Systems the Bell of the Objects
Volodymyr Saiko, Volodymyr Nakonechnyi, Serhii Tolyupa, Serhii Dakov
17-25
Abstract views: 892 | PDF Downloads: 460
DOI:
https://doi.org/10.28925/2663-4023.2018.1.1725
PDF (Українська)
Practical Points for Information Security Considering Limited Financing
Yurii V. Borsukovskyi, Victoria Y. Borsukovska
26-34
Abstract views: 1519 | PDF Downloads: 608
DOI:
https://doi.org/10.28925/2663-4023.2018.1.2634X
PDF (Українська)
Perspectives for Development of Block Chain Applications in Ukraine
Svitlana O. Spasiteleva, Volodymyr L. Buriachok
35-48
Abstract views: 2073 | PDF Downloads: 1364
DOI:
https://doi.org/10.28925/2663-4023.2018.1.3548
PDF (Українська)
Application of Cloud-Based Learning Technologies in the Organization Students’ Research Work
Dmytro Bodnenko, Nykyta Ostapenko
49-55
Abstract views: 730 | PDF Downloads: 373
DOI:
https://doi.org/10.28925/2663-4023.2018.1.4955
PDF
Informative Safety of Unmanned Aviation Systems Radio Communication Channel
Oleksii Mykhatskyi
56-62
Abstract views: 771 | PDF Downloads: 507
DOI:
https://doi.org/10.28925/2663-4023.2018.1.5662
PDF (Українська)
Mathematical Model of Information Security’s Threat Agent
Yury Shcheblanin, Dmytro Rabchun
63-72
Abstract views: 2510 | PDF Downloads: 998
DOI:
https://doi.org/10.28925/2663-4023.2018.1.6372
PDF (Українська)
Methodological Aspects of the Internet of Things Disciplines Study
Vadym O. Abramov, Oksana S. Lytvyn
73-85
Abstract views: 981 | PDF Downloads: 587
DOI:
https://doi.org/10.28925/2663-4023.2018.1.7385
PDF (Українська)
Audit of Information Security is the basis of Effective Protection of the Enterprise
Yanina Vl. Roy, Nataliia P. Mazur, Pavlo M. Skladannyi
86-93
Abstract views: 2489 | PDF Downloads: 1097
DOI:
https://doi.org/10.28925/2663-4023.2018.1.8693
PDF (Українська)
Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic
Anatoliy V. Bessalov
94-104
Abstract views: 804 | PDF Downloads: 381
DOI:
https://doi.org/10.28925/2663-4023.2018.1.94104
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue