Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 2 No. 22 (2023): Cybersecurity: Education, Science, Technique
Vol. 2 No. 22 (2023): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2023.22
Published:
2023-12-28
Title
Title
PDF (Українська)
Content
Contents
4-5
Abstract views: 193 | PDF Downloads: 95
PDF (Українська)
Articles
THREATS AND RISKS OF THE USE OF ARTIFICIAL INTELLIGENCE
Oleksii Skitsko, Pavlo Skladannyi, Roman Shyrshov, Mykhailo Humeniuk, Maksym Vorokhob
6-18
Abstract views: 4034 | PDF Downloads: 1698
DOI:
https://doi.org/10.28925/2663-4023.2023.22.618
PDF (Українська)
CONSTRUCTION OF AN IMPROVED ENCRYPTION SCHEME ON GENERALIZED SUZUKI 2-GROUPS IN THE MST3 CRYPTOSYSTEM
Yevgen Kotukh, Hennady Khalimov, Maksym Korobchynskyi
19-30
Abstract views: 519 | PDF Downloads: 339
DOI:
https://doi.org/10.28925/2663-4023.2023.22.1930
PDF (Українська)
THE METHOD OF EXCLUSION OF KNOWN SIGNALS WHEN SCANNING A SPECIFIED RADIO RANGE
Oleksandr Laptiev, Serhii Zozulia
31-38
Abstract views: 572 | PDF Downloads: 326
DOI:
https://doi.org/10.28925/2663-4023.2023.22.3138
PDF (Українська)
ENHANCED CRYPTOGRAPHIC SECURITY OF AGGREGATED DIGITAL SIGNATURES THROUGH UTILIZATION OF A UNIFIED AUTHENTICATION FRAMEWORK
Vitalii Chubaievskyi, Nataliia Lutska, Tetyana Savchenko, Lidiia Vlasenko, Kyrylo Synelnyk
39-53
Abstract views: 556 | PDF Downloads: 375
DOI:
https://doi.org/10.28925/2663-4023.2023.22.3953
PDF
ANALYSIS OF CURRENT THREATS TO THE INFORMATION SECURITY OF ORGANIZATIONSAND THE FORMATION OF THE INFORMATION PLATFORM AGAINST THEM
Svitlana Lehominova, Halyna Haidur
54-67
Abstract views: 1510 | PDF Downloads: 754
DOI:
https://doi.org/10.28925/2663-4023.2023.22.5467
PDF (Українська)
MODEL FOR CALCULATING THE COSTS OF A BUG BOUNTY PROGRAM FOR TESTING SECURITY VULNERABILITIES
Feodosiy Kipchuk, Volodymyr Sokolov
68-83
Abstract views: 736 | PDF Downloads: 345
DOI:
https://doi.org/10.28925/2663-4023.2023.22.6883
PDF (Українська)
METHOD OF LOW-RESOURCE HASHING TYPE "DATA – GENERATOR"
Vitalii Seleznov, Volodymyr Luzhetskyi
84-95
Abstract views: 540 | PDF Downloads: 398
DOI:
https://doi.org/10.28925/2663-4023.2023.22.8495
PDF (Українська)
ANALYSIS OF THE PROBLEMS OF USING EXISTING WEB VULNERABILITY STANDARDS
Petro Petriv, Ivan Opirskyy
96-112
Abstract views: 752 | PDF Downloads: 604
DOI:
https://doi.org/10.28925/2663-4023.2023.22.96112
PDF (Українська)
РОЗРОБКА МЕТОДИКИ ВИПРОБУВАНЬ БІБЛІОТЕКИ КРИПТОГРАФІЧНИХ ПЕРЕТВОРЮВАНЬ НА ПРИКЛАДІ КРИПТОСИСТЕМИ MST3 НА ОСНОВІ УЗАГАЛЬНЕНИХ СУЗУКІ 2-ГРУП
Yevgen Kotukh, Oleksandr Marukhnenko, Hennadii Khalimov, Maksym Korobchynskyi
113-121
Abstract views: 463 | PDF Downloads: 309
DOI:
https://doi.org/10.28925/2663-4023.2023.22.113121
PDF (Українська)
PRACTICAL APPROACHES TO ORGANIZING SECURE DATA TRANSFER VIA TLS PROTOCOL USING OPENSSL MEANS
Anna Ilyenko, Sergii Ilyenko, Olena Prokopenko, Iryna Kravchuk
122-133
Abstract views: 612 | PDF Downloads: 324
DOI:
https://doi.org/10.28925/2663-4023.2023.22.122133
PDF
SELF-DIAGNOSIS AS A WAY TO INCREASE THE CYBER RESISTANCE OF TERMINAL COMPONENTS OF A TECHNOLOGICAL SYSTEM
Serhii Toliupa, Yurii Samokhvalov, Pavlo Khusainov, Serhii Shtanenko
134-147
Abstract views: 606 | PDF Downloads: 362
DOI:
https://doi.org/10.28925/2663-4023.2023.22.134147
PDF (Українська)
ANALYSIS OF METHODS FOR DETECTING MISINFORMATION IN SOCIAL NETWORKS USING MACHINE LEARNING
Maksym Martseniuk, Valerii Kozachok, Oleksandr Bohdanov, Ievgen Iosifov, Zoreslava Brzhevska
148-155
Abstract views: 1615 | PDF Downloads: 205
DOI:
https://doi.org/10.28925/2663-4023.2023.22.148155
PDF (Українська)
RESEARCH OF DEVELOPMENT AND INNOVATION OF CYBER PROTECTION AT CRITICAL INFRASTRUCTURE FACILITIES
Yana Mashtaliar, Valerii Kozachok, Zoreslava Brzhevska, Oleksandr Bohdanov, Iryna Oksanych, Валерій Литвинов
156-167
Abstract views: 1349 | PDF Downloads: 243
DOI:
https://doi.org/10.28925/2663-4023.2023.22.156167
PDF (Українська)
GAME THEORETICAL APPROACH TO THE MODELING OF CONFLICTS IN INFORMATION SECURITY SYSTEMS
Svitlana Shevchenko, Yuliia Zhdanovа, Pavlo Skladannyi, Sofia Boiko
168-178
Abstract views: 1125 | PDF Downloads: 474
DOI:
https://doi.org/10.28925/2663-4023.2023.22.168178
PDF (Українська)
ZERO TRUST CONCEPT FOR ACTIVE DIRECTORY PROTECTION TO DETECT RANSOMWARE
Danyil Zhuravchak, Pavlo Hlushchenko, Maksym Opanovych, Valerii Dudykevych, Andrian Piskozub
179-190
Abstract views: 759 | PDF Downloads: 449
DOI:
https://doi.org/10.28925/2663-4023.2023.22.179190
PDF (Українська)
GENERATION OF PSEUDORANDOM SEQUENCES ON MICROCONTROLLERS WITH LIMITED COMPUTATIONAL RESOURCES, ENTROPY SOURCES, AND STATISTICAL PROPERTIES TESTING
Roman Chernenko
191-203
Abstract views: 626 | PDF Downloads: 359
DOI:
https://doi.org/10.28925/2663-4023.2023.22.191203
PDF (Українська)
MODEL OF IMPLEMENTATION OF ELECTRONIC COMMERCE TECHNOLOGIES
Oleksandr Kharchenko, Valentyn Yaremych
204-213
Abstract views: 566 | PDF Downloads: 458
DOI:
https://doi.org/10.28925/2663-4023.2023.22.2042013
PDF (Українська)
ENSURING THE SECURITY OF CORPORATE USERS ACCOUNTS
Ivan Tyshyk
214-225
Abstract views: 504 | PDF Downloads: 296
DOI:
https://doi.org/10.28925/2663-4023.2023.22.214225
PDF (Українська)
EXPLORING THE BENEFITS OF CROSS-IMPLEMENTING CYBERSECURITY STANDARDS TO COMBAT RANSOMWARE CYBER CRIMES
Valeriy Dudykevych, Oleh Harasymchuk, Andrii Partyka , Yaroslav Sovyn, Elena Nyemkova
226-237
Abstract views: 804 | PDF Downloads: 398
DOI:
https://doi.org/10.28925/2663-4023.2023.22.226237
PDF (Українська)
METHOD FOR ADAPTING RECURSIVE SYSTEMATIC CONVOLUTIONAL CODES OF TURBO CODES BY BYPASSING THE NODES OF THE SPATIAL GRID
Kurbet Pavlo, Liliia Zaitseva
238-248
Abstract views: 482 | PDF Downloads: 175
DOI:
https://doi.org/10.28925/2663-4023.2023.22.238248
PDF (Українська)
METHODOLOGY FOR THE DEVELOPMENT OF EDUCATIONAL DIGITAL RESOURCES IN THE FORM OF ONLINE GAMES
Olena Skliarenko, Denys Pokydko
249-256
Abstract views: 346 | PDF Downloads: 159
DOI:
https://doi.org/10.28925/2663-4023.2023.22.249256
PDF (Українська)
ANTHROPOMORPHIC NETWORKS AS REPRESENTATIVES OF GLOBAL CONSCIOUSNESS
Serhii Yahodzinskyi , Volodumur Kotsun
257-263
Abstract views: 316 | PDF Downloads: 139
DOI:
https://doi.org/10.28925/2663-4023.2023.22.257263
PDF (Українська)
DEVELOPMENT OF A CORPORATE EDUCATIONAL INFORMATION SYSTEM WITH THE HELP OF MACHINE LEARNING METHODS AND METHODS OF ENSURING INFORMATION SECURITY
Oleksiy Ananchenko
264-273
Abstract views: 363 | PDF Downloads: 150
DOI:
https://doi.org/10.28925/2663-4023.2023.22.264273
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue