Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 19 (2023): Cybersecurity: Education, Science, Technique
Vol. 3 No. 19 (2023): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2023.19
Published:
2023-03-30
Title
Title
PDF (Українська)
Articles
SOFT SKILLS FOR SOFTWARE DEVELOPERS
Olena Trofymenko, Oksana Savielieva, Yuliia Prokop, Nataliia Loginova, Anastasiia Dyka
6-19
Abstract views: 349 | PDF Downloads: 309
DOI:
https://doi.org/10.28925/2663-4023.2023.19.619
PDF (Українська)
METHOD OF FORMING ASSOCIATIVE RULES FROM THE SIEM DATABASE BASED ON FUZZY SET THEORY AND LINGUISTIC TERMS
Ihor Subach , Artem Mykytiuk
20-33
Abstract views: 237 | PDF Downloads: 144
DOI:
https://doi.org/10.28925/2663-4023.2023.19.2033
PDF (Українська)
CHOICE OF REMOTE ACCESS TECHNOLOGY FOR EFFECTIVE ORGANIZATION OF PROTECTION OF NETWORK CONNECTIONS
Ivan Tyshyk
34-45
Abstract views: 253 | PDF Downloads: 183
DOI:
https://doi.org/10.28925/2663-4023.2023.19.3445
PDF (Українська)
ISO 27001: ANALYSIS OF CHANGES AND COMPLIANCE FEATURES OF THE NEW VERSION OF THE STANDARD
Yevhenii Kurii, Ivan Opirskyy
46-55
Abstract views: 1080 | PDF Downloads: 541
DOI:
https://doi.org/10.28925/2663-4023.2023.19.4655
PDF (Українська)
BLOCKCHAIN-BASED LEARNING MANAGEMENT SYSTEMS
Valerii Yalanetskyi
56-68
Abstract views: 168 | PDF Downloads: 252
DOI:
https://doi.org/10.28925/2663-4023.2023.19.5668
PDF (Українська)
STUDY OF THE STRUCTURE OF THE SYSTEM FOR DETECTING AND PREVENTING RANSOMWARE ATTACKS BASED ON ENDPOINT DETECTION AND RESPONSE
Danyil Zhuravchak, Valerii Dudykevych, Anastasiia Tolkachova
69-82
Abstract views: 281 | PDF Downloads: 206
DOI:
https://doi.org/10.28925/2663-4023.2023.19.6982
PDF (Українська)
APPROACHES TO THE CLASSIFICATION OF CYBERSOCIALITY OF MILITARY PERSONNEL ACCORDING TO THE DEGREE OF INTEGRATION IN CYBERSPACE AND POSSIBLE CONSEQUENCES
Igor Kozubtsov, Lesya Kozubtsova, Oleksandr Saenko, Tetiana Tereshchenko
83-95
Abstract views: 198 | PDF Downloads: 89
DOI:
https://doi.org/10.28925/2663-4023.2023.19.8395
PDF (Українська)
PRACTICAL APPROACHES TO DETECTING VULNERABILITIES IN INFORMATION AND TELECOMMUNICATION NETWORKS
Anna Ilyenko, Sergii Ilyenko, Kvasha Diana, Yana Mazur
96-108
Abstract views: 220 | PDF Downloads: 331
DOI:
https://doi.org/10.28925/2663-4023.2023.19.96108
PDF (Українська)
HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION
Oleksandr Ponomarov, Serhii Pyvovarchuk, Lesya Kozubtsova, Igor Kozubtsov, Tetiana Bondarenko, Tetiana Tereshchenko
109-121
Abstract views: 178 | PDF Downloads: 112
DOI:
https://doi.org/10.28925/2663-4023.2023.19.109121
PDF (Українська)
COGNITIVE MODEL OF FORMATION OF THE KNOWLEDGE BASE FOR ASSESSING THE FINANCIAL CONDITION OF ENTERPRISES
Ihor Karpunin
122-134
Abstract views: 153 | PDF Downloads: 88
DOI:
https://doi.org/10.28925/2663-4023.2023.19.122134
PDF (Українська)
ARTIFICIAL NEURAL NETWORK TRAINING BASED ON PERFORMANCE AND RISKS ASSESSMENT DATA OF THE INVESTMENT IN DIGITAL ASSETS
Bohdan Bebeshko
135-145
Abstract views: 234 | PDF Downloads: 127
DOI:
https://doi.org/10.28925/2663-4023.2023.19.135145
PDF (Українська)
COMPLEX METHOD FOR AUTOMATIC RECOGNITION OF NATURAL LANGUAGE AND EMOTIONAL STATE
Ievgen Iosifov
146-164
Abstract views: 183 | PDF Downloads: 286
DOI:
https://doi.org/10.28925/2663-4023.2023.19.146164
PDF (Українська)
MATHEMATICAL METHODS IN CYBERSECURITY: CATASTROPHE THEORY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva
165-175
Abstract views: 207 | PDF Downloads: 115
DOI:
https://doi.org/10.28925/2663-4023.2023.19.165175
PDF (Українська)
SYSTEM FOR CYBER SECURITY EVENTS CORRELATION AND INCIDENT MANAGEMENT IN CRITICAL INFRASTRUCTURE OBJECTS
Sergiy Gnatyuk, Rat Berdibayev , Viktoriia Sydorenko, Oksana Zhyharevych, Tetiana Smirnova
176-196
Abstract views: 380 | PDF Downloads: 360
DOI:
https://doi.org/10.28925/2663-4023.2023.19.176196
PDF (Українська)
WAYS OF BUILDING AN INTELLIGENT AGRICULTURAL COMPANY MANAGEMENT SYSTEM
Anton Tarasiyk, Volodymyr Gamaliy, Svitlana Rzaieva
197-208
Abstract views: 212 | PDF Downloads: 212
DOI:
https://doi.org/10.28925/2663-4023.2023.19.197208
PDF (Українська)
DETECTION OF NETWORK INTRUSIONS USING MACHINE LEARNING ALGORITHMS AND FUZZY LOGIC
Yevhen Chychkarov, Olga Zinchenko, Andriy Bondarchuk, Liudmyla Aseeva
209-225
Abstract views: 148 | PDF Downloads: 53
DOI:
https://doi.org/10.28925/2663-4023.2023.19.209225
PDF (Українська)
PRE-PROJECT SOLUTIONS FOR BUILDING AN AUTHORIZATION SYSTEM BASED ON THE ZERO TRUST CONCEPT
Larysa Kriuchkova, Pavlo Skladannyi, Maksym Vorokhob
226-242
Abstract views: 110 | PDF Downloads: 45
DOI:
https://doi.org/10.28925/2663-4023.2023.13.226242
PDF (Українська)
IMPROVEMENT OF PROTECTIVE EFFECTS ON DANGEROUS HIGH-FREQUENCY IMPRESSION SIGNALS
Larysa Kriuchkova , Ivan Tsmokanych
243-253
Abstract views: 116 | PDF Downloads: 36
DOI:
https://doi.org/10.28925/2663-4023.2023.19.243253
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue