Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 23 (2024): Cybersecurity: Education, Science, Technique
Vol. 3 No. 23 (2024): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2024.23
Published:
2024-03-28
Articles
SYNTHESIS OF DISCRETE AND ALGEBRAIC MODELS OF ELEMENTARY FUNCTIONS OF DATA-CONTROLLED OPERATIONS
Volodymyr Rudnytskyi, Nataliia Lada, Dmytro Pidlasyi, Olga Melnyk
6-16
Abstract views: 52 | PDF Downloads: 50
DOI:
https://doi.org/10.28925/2663-4023.2024.23.616
PDF (Українська)
PENETRATION TESTING USING DEEP REINFORCEMENT LEARNING
Anastasiia Tolkachova, Maksym-Mykola Posuvailo
17-30
Abstract views: 40 | PDF Downloads: 30
DOI:
https://doi.org/10.28925/2663-4023.2024.23.1730
PDF (Українська)
CLUSTER ANALYSIS FOR RESEARCHING DIGITAL FOOTPRINTS OF STUDENTS IN EDUCATIONAL INSTITUTIONS
Valeriy Lakhno, Semen Voloshyn, Serhii Mamchenko, Oleg Kulynich, Dmytro Kasatkin
31-41
Abstract views: 36 | PDF Downloads: 20
DOI:
https://doi.org/10.28925/2663-4023.2024.23.3141
PDF (Українська)
A PROFESSIONAL APPROACH AS A METHOD OF PROTECTING INFORMATION AT THE STAGES OF DEVELOPMENT OF RELATIONAL DATABASES AND SOFTWARE FOR WORKING WITH THEM
Yaroslava Momryk, Yuriy Yashchuk, Roman Tuchapskyi
42-55
Abstract views: 74 | PDF Downloads: 111
DOI:
https://doi.org/10.28925/2663-4023.2024.23.4255
PDF (Українська)
STATISTICAL METHODS FOR PREDICTING PHISHING ATTACKS
Yurii Dobryshyn
56-70
Abstract views: 36 | PDF Downloads: 26
DOI:
https://doi.org/10.28925/2663-4023.2024.23.5670
PDF (Українська)
INFORMATION TECHNOLOGY OF SOFTWARE DATA SECURITY MONITORING
Leonid Kupershtein, Hennadii Lutsyshyn, Mykhailo Krentsin
71-84
Abstract views: 45 | PDF Downloads: 31
DOI:
https://doi.org/10.28925/2663-4023.2024.23.7184
PDF (Українська)
APPLICATION OF IOT PROTOCOLS IN SURFACE WATER POLLUTION MONITORING SYSTEMS
Anton Kovalenko
85-96
Abstract views: 32 | PDF Downloads: 23
DOI:
https://doi.org/10.28925/2663-4023.2024.23.8596
PDF
RESEARCH ON DIFFERENTIAL CRYPTANALYSIS BASED ON DEEP LEARNING
Jiang Xue , Valerii Lakhno, Andrii Sahun
97-109
Abstract views: 40 | PDF Downloads: 29
DOI:
https://doi.org/10.28925/2663-4023.2024.23.97109
PDF
STUDY OF REQUIREMENTS AND CYBER SECURITY ANALYSIS OF THE SOFTWARE OF INFORMATION AND CONTROL SYSTEMS OF NPP, IMPORTANT FOR SECURITY
Borys Vintenko, Iryna Myronets, Oleksii Smirnov, Oksana Kravchuk , Nataliia Kozirova, Hryhorii Savelenko, Anna Kovalenko
111-131
Abstract views: 89 | PDF Downloads: 41
DOI:
https://doi.org/10.28925/2663-4023.2024.23.111131
PDF (Українська)
DETECTION, ANALYSIS AND PROTECTION OF CONFIDENTIAL DATA USING AMAZON MACIE MACHINE LEARNING TECHNOLOGY
Andrii Partyka, Olha Mykhaylova, Stanislav Shpak
132-144
Abstract views: 55 | PDF Downloads: 36
DOI:
https://doi.org/10.28925/2663-4023.2024.23.132144
PDF (Українська)
SECURITY OF PAYMENT TRANSACTIONS: OVERVIEW AND CHARACTERISTICS OF KEY CHANGES IN THE NEW EDITION OF THE PCI DSS STANDARD
Yevhenii Kurii, Ivan Opirskyy
145-155
Abstract views: 70 | PDF Downloads: 47
DOI:
https://doi.org/10.28925/2663-4023.2024.23.145155
PDF (Українська)
REPLICA STATE DISCOVERY PROTOCOL BASED ON ADVANCED MESSAGE QUEUING PROTOCOL
Maksym Kotov , Serhii Toliupa, Volodymyr Nakonechnyi
156-171
Abstract views: 29 | PDF Downloads: 26
DOI:
https://doi.org/10.28925/2663-4023.2024.23.156171
PDF
FEATURES OF MODERN CONCEPTUAL AND TERMINOLOGICAL APPARATUS IN THE FIELD OF TRAINING OF CYBER SECURITY SPECIALISTS
Serhiі Horlichenko
171-181
Abstract views: 46 | PDF Downloads: 58
DOI:
https://doi.org/10.28925/2663-4023.2024.23.171181
PDF (Українська)
METHOD OF DETECTION OF INFORMATION LEAKAGE BY REJECTING TRAFFIC FROM THE INFORMATION COMMUNICATION NETWORK
Sergey Gluhov; Andrii Sobchuk, Volodymyr Rovda, Мykola Рolovinkin, Vitaly Ponomarenko
182-198
Abstract views: 42 | PDF Downloads: 19
DOI:
https://doi.org/10.28925/2663-4023.2024.23.182198
PDF (Українська)
ANALYSIS OF POTENTIAL PERSONAL DATA LEAKS IN WEB BROWSERS
Оlexander Zadereyko, Olena Trofymenko , Nataliia Loginova , Yuliia Loboda , Yuliia Prokop
199-212
Abstract views: 32 | PDF Downloads: 36
DOI:
https://doi.org/10.28925/2663-4023.2024.23.199212
PDF (Українська)
DETECTION OF MALICIOUS ACTIVITY USING A NEURAL NETWORK FOR CONTINUOUS OPERATION
Vladyslav Sosnovyy, Nataliia Lashchevska
213-224
Abstract views: 35 | PDF Downloads: 21
DOI:
https://doi.org/10.28925/2663-4023.2024.23.213224
PDF (Українська)
ANALYSIS OF CYBER THREATS IN THE CONTEXT OF RAPID DEVELOPMENT OF INFORMATION TECHNOLOGY
Oleg Haiduk, Volodymyr Zverev
225-236
Abstract views: 110 | PDF Downloads: 55
DOI:
https://doi.org/10.28925/2663-4023.2024.23.225236
PDF (Українська)
COGNITIVE TECHNOLOGY FOR THE FORMATION OF COMPETENCIES OF STUDENTS IN THE STUDY OF NATURAL SCIENCE SUBJECTS
Alona Desiatko, Natalia Khorolska, Vitalii Chubaievskyi
237-245
Abstract views: 31 | PDF Downloads: 34
DOI:
https://doi.org/10.28925/2663-4023.2024.23.237245
PDF (Українська)
INTERIOR ROOM INFLUENCE ON THE DEFENCE FROM LASER ACOUSTIC INTELLIGENCE SYSTEMS
Liubomyr Parkhuts, Yaroslav Sovyn, Larysa Rakobovchuk
246-257
Abstract views: 35 | PDF Downloads: 51
DOI:
https://doi.org/10.28925/2663-4023.2024.23.246257
PDF (Українська)
MATHEMATICAL METHODS IN CYBER SECURITY: CLUSTER ANALYSIS AND ITS APPLICATION IN INFORMATION AND CYBERNETIC SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva, Nataliia Mazur , Pavlo Skladannyi, Vitalii Nehodenko
258-273
Abstract views: 63 | PDF Downloads: 37
DOI:
https://doi.org/10.28925/2663-4023.2024.23.258273
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue