Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 17 (2022): Cybersecurity: Education, Science, Technique
Vol. 1 No. 17 (2022): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2022.17
Published:
2022-09-29
Title
Title
1-3
Abstract views: 128 | PDF Downloads: 89
PDF (Українська)
Content
Contents
4-5
Abstract views: 86 | PDF Downloads: 40
PDF (Українська)
Articles
OPTIMIZATION OF PLACEMENT OF INFORMATION PROTECTION MEANS BASED ON THE APPLICATION OF A GENETIC ALGORITHM
Valerii Lakhno, Volodimir Maliukov, Larysa Komarova, Dmytro Kasatkin, Tetiana Osypova, Yehor Chasnovskyi
6-20
Abstract views: 264 | PDF Downloads: 185
DOI:
https://doi.org/10.28925/2663-4023.2022.17.620
PDF (Українська)
THE POTENTIAL OF VARIOUS ARTIFICIAL INTELLIGENCE METHODS APPLICATION IN THE PROBLEM OF DRAWING RECOGNITION AND 2D 3D TRANSFORMATION
Karyna Khorolska
21-30
Abstract views: 377 | PDF Downloads: 185
DOI:
https://doi.org/10.28925/2663-4023.2022.17.2130
PDF (Українська)
ВДОСКОНАЛЕННЯ КІБЕРЗАХИСТУ ЗБРОЙНИХ СИЛ З УРАХУВАННЯМ ДОСВІДУ ПРОТИДІЇ ВІЙСЬКОВИМ КІБЕРОБЕРАЦІЯМ РОСІЙСЬКОЇ ФЕДЕРАЦІЇ В 2022 РОЦІ
Oleksii Baidur
31-45
Abstract views: 290 | PDF Downloads: 372
DOI:
https://doi.org/10.28925/2663-4023.2022.17.3145
PDF (Українська)
PROSPECTIVE DIRECTIONS OF TRAFFIC ANALYSIS AND INTRUSION DETECTION BASED ON NEURAL NETWORKS
Anna Ilyenko , Sergii Ilyenko , Iryna Kravchuk, Marharyta Herasymenko
46-56
Abstract views: 261 | PDF Downloads: 142
DOI:
https://doi.org/10.28925/2663-4023.2022.17.4656
PDF
MODERN APPROACHES TO PROVIDING CYBER SECURITY IN RADIO RELAY COMMUNICATION LINES
Vitalii Oleksenko , Roman Shtonda, Yuliya Chernish, Irina Maltseva
57-64
Abstract views: 227 | PDF Downloads: 193
DOI:
https://doi.org/10.28925/2663-4023.2022.17.5764
PDF (Українська)
ALGORITHM FOR CONNECTING ONLINE PAYMENT SERVICES FONDY, LIQPAY AND THEIR IMPLEMENTATION
Andrii Stupin, Liudmyla Hlynchuk, Tetiana Hryshanovych
6575
Abstract views: 235 | PDF Downloads: 166
DOI:
https://doi.org/10.28925/2663-4023.2022.17.6575
PDF (Українська)
ABOUT THE CYBERSECURITY OF MILITARY PERSONNEL PLAYING GEOLOCATION GAMES WHILE STAYING AT DEPARTMENTAL CRITICAL INFORMATION INFRASTRUCTURE FACILITIES
Lesya Kozubtsova, Igor Kozubtsov, Tetiana Tereshchenko, Tetiana Bondarenko
76-90
Abstract views: 620 | PDF Downloads: 137
DOI:
https://doi.org/10.28925/2663-4023.2022.17.7690
PDF (Українська)
RESEARCH TOOLS FOR PROTECTING INTERNET RESOURCES FROM DDOS-ATTACK DURING CYBERWAR
Illia Laktionov, Andrii Kmit, Ivan Opirskyy, Oleh Harasymchuk
91-111
Abstract views: 341 | PDF Downloads: 368
DOI:
https://doi.org/10.28925/2663-4023.2022.17.91111
PDF (Українська)
CLOUD TECHNOLOGIES IN LEARNING: ONTOLOGICAL APPROACH
Olha Tkachenko, Kostiantyn Tkachenko, Oleksandr Tkachenko
112-127
Abstract views: 227 | PDF Downloads: 123
DOI:
https://doi.org/10.28925/2663-4023.2022.17.112127
PDF
RANDOMIZATION OF CSIDH ALGORITHM ON QUADRATIC AND TWISTED EDWARDS CURVES
Anatoliy Bessalov, Ludmila Kovalchuk, Sergey Abramov
128-144
Abstract views: 222 | PDF Downloads: 177
DOI:
https://doi.org/10.28925/2663-4023.2022.17.128144
PDF (Українська)
VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS
Hennadii Hulak, Yuliia Zhdanovа, Pavlo Skladannyi, Yevhen Hulak, Viktor Korniiets
145-158
Abstract views: 305 | PDF Downloads: 156
DOI:
https://doi.org/10.28925/2663-4023.2022.17.145158
PDF (Українська)
DEVELOPMENT OF RECOMMENDATIONS FOR REDUCING CYBER THREATS DURING REMOTE WORK FROM THE POINT OF VIEW OF CYBER SECURITY
Iryna Pazynina, Ruslan Korchomnyi
159-166
Abstract views: 447 | PDF Downloads: 251
DOI:
https://doi.org/10.28925/2663-4023.2022.17.159166
PDF (Українська)
ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV
Sergiy Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, Olena Nechyporuk, Bohdan Horbakha
167-186
Abstract views: 339 | PDF Downloads: 553
DOI:
https://doi.org/10.28925/2663-4023.2022.17.167186
PDF (Українська)
INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA
Yuriy Holovan, Anatoly Kurilo
187-197
Abstract views: 159 | PDF Downloads: 87
DOI:
https://doi.org/10.28925/2663-4023.2022.17.187197
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue