Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 1 No. 29 (2025): Cybersecurity: Education, Science, Technique
Vol. 1 No. 29 (2025): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2025.29
Published:
2025-09-26
Articles
BYPASSING EDR COMBINED WITH SIEM: ANALYSIS OF ATTACK CONCEALMENT TECHNIQUES IN LOGS – A STUDY OF ADVERSARIAL TACTICS FOR DETECTION EVASION
Ivan Opirskyy, Taras Dzoban, Sviatoslav Vasylyshyn
8-26
Abstract views: 26 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.865
PDF (Українська)
DETECTION OF MANIPULATIVE COMPONENT IN TEXT MESSAGES OF MASS MEDIA IN THE CONTEXT OF PROTECTION OF DOMESTIC CYBERSPACE
Oleksandr Korchenko, Ihor Tereikovskyi, Ivan Dychka, Vitaliy Romankevich, Liudmyla Tereikovska
27-40
Abstract views: 11 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.839
PDF (Українська)
AREAS OF APPLICATION OF ARTIFICIAL INTELLIGENCE IN GAME DEVELOPMENT AND TESTING
Olena Trofymenko , Anastasiia Dyka, Оlexander Zadereyko, Оlexander Shevchenko
41-58
Abstract views: 4 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.832
PDF (Українська)
DESIGNING NETWORK INFRASTRUCTURE WITH CYBERSECURITY REQUIREMENTS IN MIND: APPROACHES AND IMPLEMENTATION BASED ON CISCO
Vadym Abramov, Oksana Hlushak, Anhelina Plokha, Timur Dovzhenko
59-72
Abstract views: 22 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.845
PDF (Українська)
RESEARCH ON THE FEASIBILITY OF IMPLEMENTING THE ZERO TRUST CONCEPT IN IOT SYSTEMS
Bohdan Mankovskyi, Vladyslav Dovbniak, Ivan Opirskyy
73-91
Abstract views: 11 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.864
PDF (Українська)
METHOD OF BIOMETRIC AUTHENTICATION OF PERSONNEL OF CRITICAL INFRASTRUCTURE FACILITIES BY FACIAL IMAGE AND IRIS OF THE EYE USING NEURAL NETWORK TOOLS
Oleksandr Korchenko, Oleh Tereikovskyi
92-106
Abstract views: 9 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.866
PDF (Українська)
SMART CONTRACTS AS PRIVACY-PRESERVING MECHANISMS IN DISTRIBUTED DIGITAL TWIN SYSTEMS
Dmytro Ovsianko, Elena Niemkova
107-123
Abstract views: 20 | PDF Downloads: 15
DOI:
https://doi.org/10.28925/2663-4023.2025.29.867
PDF (Українська)
ASSESSING THE POTENTIAL OF USING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING MODELS TO ENSURE THE SECURITY OF CLOUD ENVIRONMENTS AND AUTOMATED MANAGEMENT SYSTEMS FOR CONTAINERIZED APPLICATIONS
Bohdan Skorynovych, Yurii Kulyk, Yuriy Lakh
124-138
Abstract views: 18 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.821
PDF (Українська)
SOFTWARE PROTECTION METHOD BASED ON HYBRID CODE ANALYSIS
Oleksandr Laptiev, Andrii Hapon, Andrii Tkachov
139-151
Abstract views: 16 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.871
PDF (Українська)
RECONSTRUCTING ENTITY RELATIONSHIPS IN DATABASE SCHEMAS WITH PLANTUML AND LLMS
Anatolii Kurotych, Lesia Bulatetska, Oksana Onyshchuk
152-160
Abstract views: 12 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.847
PDF
INTELLIGENT APPROACHES FOR ENHANCING WAREHOUSE EFFICIENCY: ITEM PLACEMENT, ORDER PICKING, AND ROBOTIC AUTOMATION
Andrii Balvak, Nataliia Lashchevska
161-177
Abstract views: 11 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.869
PDF (Українська)
INTER-ORGANIZATIONAL EXCHANGE OF CONFIDENTIAL PERSONAL DATA BASED ON PERMISSIONED BLOCKCHAIN
Valeriia Balatska, Nazarii Dmytriv
178-193
Abstract views: 21 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.29.875
PDF (Українська)
HYBRID MACHINE LEARNING METHODS FOR DECISION SUPPORT IN AUTOMATED INFORMATION SYSTEMS
Pavlo Kudrynskyi, Oleksandr Zvenyhorodskyi
194-206
Abstract views: 9 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.880
PDF (Українська)
TECHNOLOGY FOR TRACKING THE MOVEMENT OF SUBSCRIBERS WITHIN THE TERRITORY OF A CRITICAL INFRASTRUCTURE ENTERPRISE
Volodymyr Sokolov
207-222
Abstract views: 13 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.920
PDF (Українська)
AUTOMATED DETECTION OF SQL INJECTION VULNERABILITIES IN CHATBOTS USING REINFORCEMENT LEARNING
Vladyslav Vikulov, Ivan Pyshnograiev
223-235
Abstract views: 6 | PDF Downloads: 10
DOI:
https://doi.org/10.28925/2663-4023.2025.29.873
PDF (Українська)
TESTING-BASED PREVENTION OF MISCONFIGURATION THREATS IN AWS INFRASTRUCTURE AS CODE
Ivan Parkhomenko, Mykhailo Savonik
236-251
Abstract views: 12 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.29.887
PDF (Українська)
CISCO NETWORKING ACADEMY AS A TOOL FOR DEVELOPING PROFESSIONAL COMPETENCES IN TECHNICAL STUDENTS
Vadym Abramov , Oksana Hlushak, Iryna Mashkina
252-262
Abstract views: 9 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.888
PDF (Українська)
SOFTWARE SUPPLY CHAIN SECURITY ANALYSIS
Andrii Skip, Yurii Baryshev
263-273
Abstract views: 15 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2025.29.820
PDF (Українська)
ONE OF THE METHODS FOR IMPLEMENTING THE ANT ALGORITHM USING THE TRAVELING SALESMAN PROBLEM AS AN EXAMPLE
Vladyslav Khotynskyi, Yuliia Pavlenko
274-286
Abstract views: 7 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.822
PDF (Українська)
METHODS AND INFORMATION TECHNOLOGIES OF DISTANCE LEARNING
Kateryna Palaguta, Oleksii Savon
287-297
Abstract views: 10 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.826
PDF (Українська)
OTENTIALS OF ARTIFICIAL INTELLIGENCE IN DETECTING AND PREVENTING PHISHING AND CYBER ATTACKS
Maksymilian Yakovlev, Volodymyr Lubchak
298-309
Abstract views: 7 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.840
PDF (Українська)
ENSURING SECURE OPERATING OF VOICE AGENTS BASED ON THE LARGE LANGUAGE MODELS
Andrii Artemenko, Bohdan Khudik
310-318
Abstract views: 5 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.868
PDF (Українська)
OPPORTUNITIES OF ARTIFICIAL INTELLIGENCE FOR CYBERSECURITY AUDIT AND RISK MANAGEMENT
Viktor Obodiak, Mykhailo Otroshchenko, Volodymyr Liubchak
319-330
Abstract views: 7 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.872
PDF (Українська)
MODELING PHISHING SCENARIOS IN UKRAINIAN CYBERSPACE: AN ANALYTICAL APPROACH USING GRAFANA-BOARD
Dmytro Prokopovych-Tkachenko, Artem Bakuta , Zverev Volodymyr, Igor Kozachenko , Oleksandr Cherkasky
331-347
Abstract views: 5 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.881
PDF (Українська)
DECISION SUPPORT FRAMEWORK FOR CRITICAL INFRASTRUCTURE CYBERSECURITY PLANNING
Natalya Dolgova, Olena Shapovalova, Hanna Solodovnyk
348-372
Abstract views: 3 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.29.884
PDF (Українська)
CRYPTOGRAPHIC KEY GENERATION SYSTEMS FOR SECURITY MODULES WITH HARDWARE SUPPORT OF IOT DEVICES
Petro Klimushyn , Maksym Khruslov , Yuriy Gnusov, Vadym Maltsev
373-404
Abstract views: 12 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.29.886
PDF (Українська)
INTEGRATION OF INTRUSION DETECTION SYSTEMS INTO THE CORPORATE NETWORK STRUCTURE: APPROACHES, CHALLENGES AND EFFICIENCY OF INCIDENT RESPONSE
Оrest Polotai, Тaras Brych, Nataliia Kukharska, Valentina Yashchuk, Artur Tkachenko
405-418
Abstract views: 11 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.889
PDF (Українська)
APPLICATION OF LLM IN UAV ROUTE PLANNING TASKS TO PREVENT DATA EXCHANGE AVAILABILITY VIOLATIONS
Oleksii Novikov, Mykola Ilin, Iryna Styopochkina, Mykola Ovcharuk, Andrii Voitsekhovskyi
419-431
Abstract views: 12 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.892
PDF
TINYBERT WITH CROSS-ATTENTION + LORA + BI-GRU: A COMPACT NEURAL NETWORK ARCHITECTURE FOR FAKE NEWS DETECTION
Ivan Peleshchak, Vasyl Lytvyn, Victoria Vysotska, Oleksii Khobor
432-451
Abstract views: 11 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.908
PDF (Українська)
INTELLIGENT METHODS FOR MULTI-POSITION LOCALIZATION OF RADIO SIGNAL SOURCES USING NEURAL NETWORKS AND ADAPTIVE FILTERS
Vasyl Trysnyuk, Volodymyr Dziuba
452-463
Abstract views: 9 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.899
PDF (Українська)
ANALYSIS OF THE EFFECTIVENESS OF BORDER TRAFFIC ANOMALY DETECTION BASED ON MACHINE LEARNING MODELS
Tetiana Savchenko, Nataliia Lutska, Lidiia Vlasenko, Natalia Tomenko
464-479
Abstract views: 4 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.898
PDF (Українська)
A METHOD FOR CALCULATING THE PROTECTION OF A CORPORATE NETWORK UNDER CONDITIONS OF UNCERTAINTY
Annа Ilyenko, Vadym Akhramovych
480-492
Abstract views: 12 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.894
PDF (Українська)
DYNAMIC INFRASTRUCTURE COMPONENTS AND SYSTEM VISIBILITY DURING CYBERSECURITY INCIDENT RESPONSE
Roman Drahuntsov, Vitaliy Zubok
493-507
Abstract views: 7 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.891
PDF (Українська)
INFORMATION SYSTEM FOR THE COLLECTION AND ANALYSIS OF DATA ON HACKER GROUP ACTIVITIES
Artem Mykytiuk, Ivan Horniichuk, Viktoriia Polishchuk , Oleksandra Bychkovska
508-524
Abstract views: 15 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.893
PDF (Українська)
ANOMALY DETECTION IN ENCRYPTED NETWORK TRAFFIC USING DEEP LEARNING
Павло Підгорний, Tetiana Lavryk
525-535
Abstract views: 8 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.897
PDF
SECURITY FRAMEWORK FOR CYBER-PHYSICAL SMART PARKING SYSTEMS WITH AUTOMATED LICENSE PLATE RECOGNITION
Volodymyr Avsiievych , Ольга Павлова, Ihor Mykhalchuk
536-547
Abstract views: 9 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.900
PDF
APPROACHES TO ENHANCING CYBER THREAT MONITORING SYSTEMS IN CORPORATE NETWORKS
Тишик Tyshyk
548-558
Abstract views: 7 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.903
PDF (Українська)
MODEL OF SOCIAL-ADAPTIVE NAVIGATION OF A MOBILE ROBOT USING REINFORCEMENT LEARNING METHODS
Liudmyla Hanenko, Viktoriia Zhebka
559-570
Abstract views: 11 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.907
PDF (Українська)
FEATURES OF NETWORK ATTACK IMPLEMENTATION THROUGH TCP/IP PROTOCOLS
Yuliia Kostiuk, Pavlo Skladannyi, Svitlana Rzaeva , Nataliia Mazur , Vyacheslav Cherevyk, Andriy Anosov
571-597
Abstract views: 21 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.915
PDF (Українська)
ANALYSIS OF METHODS FOR CALCULATING THE OSPF DYNAMIC ROUTING PROTOCOL METRIC CONSIDERING INFORMATION SECURITY RISK
Vadym Chakrian, Dmytro Andrushko, Arkadii Snihurov, Serhii Pshenychnykh
598-608
Abstract views: 4 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.914
PDF (Українська)
IDENTIFICATION OF MILITARY OBJECTS BASED ON ARTIFICIAL NEURAL NETWORKS
Anton Kostiuk, Serhiy Zaitsev, Vladislav Vasylenko, Lilia Zaitseva
609-627
Abstract views: 10 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.912
PDF (Українська)
ASSESSMENT OF THE EFFECTIVENESS OF THE CONFIDENTIAL INFORMATION PROTECTION SYSTEM OF DISTRIBUTED INFORMATION SYSTEMS
Serhii Lenkov, Volodymyr Dzhulii, Igor Muliar, Yevhen Lenkov, Ruslan Koltsov
628-644
Abstract views: 6 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.916
PDF (Українська)
EXPERIMENTAL GENERATION OF SUPPORTS BASED ON LIGHTNING INFILL PRINCIPLES FOR FDM 3D PRINTING
Ivan Oleinykov, Karyna Khorolska
645-663
Abstract views: 14 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.919
PDF (Українська)
SECURITY OF LARGE LANGUAGE MODELS: RISKS, THREATS, AND SECURITY APPROACHES
Halyna Haydur; Vadym Vlasenko; Oleksandra Petrova
664-675
Abstract views: 11 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.918
PDF (Українська)
CONCEPT OF AUTOMATED RESPONSE TO THREATS IN CORPORATE DATABASES IN REAL-TIME MODE
Svitlana Lehominova , Tetiana Kapeliushna, Yurii Shchavinskyi, Mykhailo Zaporozhchenko, Oleksandr Budzynskyi
676-686
Abstract views: 13 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.927
PDF
COMPREHENSIVE MODEL FOR SELECTING ANTIVIRUS SOFTWARE FOR CRITICAL INFRASTRUCTURE FACILITIES
Serhii Buchyk, Maksym Maievskyi
687-695
Abstract views: 7 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.929
PDF (Українська)
SOCIAL MEDIA SYBIL DETECTION IN THE AGE OF AI-GENERATED CONTENT
Oleh Melnychuk
696-703
Abstract views: 12 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.29.885
PDF (Українська)
RESEARCH ON CYBERSECURITY TECHNOLOGIES FOR BANKING SYSTEMS USING ARTIFICIAL INTELLIGENCE
Pavlo Usik, Tetiana Smirnova, Kostiantyn Buravchenko, Oleksii Smirnov, Oleksandr Ulichev, Serhii Smirnov
704-716
Abstract views: 17 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2025.29.930
PDF (Українська)
METHOD FOR DETECTING PATTERNS IN THE EVOLUTION OF CYBERATTACK TECHNIQUES BASED ON TOPOLOGICAL DATA ANALYSIS
Vitalii Fesokha, Ihor Subach
717-731
Abstract views: 22 | PDF Downloads: 10
DOI:
https://doi.org/10.28925/2663-4023.2025.29.933
PDF (Українська)
INNOVATIVE APPROACHES TO IMPROVING THE LEVEL OF CYBERSECURITY OF CORPORATE NETWORKS USING CLOUD TECHNOLOGIES
Ihor Averichev, Artem Rozhenko, Yevhen Kykhtenko
732-747
Abstract views: 13 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.934
PDF (Українська)
EVALUATING CRYPTOGRAPHIC RESILIENCE IN THE FREDHOLM CRYPTOSYSTEM: METHODOLOGY AND RESULTS ANALYSIS
Ruslan Hryshchuk, Olha Hryshchuk
748-761
Abstract views: 11 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2025.29.935
PDF (Українська)
GRAPH-BASED METHODOLOGY FOR DETECTION AND LOCALIZATION OF CYBER THREATS IN CLOUD ENVIRONMENTS WITH INTEGRATED IOT COMPONENTS
Nadiia Dovzhenko, Yevhen Ivanichenko, Yuliia Kostiuk
762-776
Abstract views: 16 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.938
PDF (Українська)
AUTOMATED DETECTION OF ANOMALIES IN CORPORATE WIRELESS NETWORK TRAFFIC USING PYTHON: METHODS, IMPLEMENTATION, AND EFFECTIVENESS EVALUATION
Izabella Sobolenko , Artem Platonenko
777-788
Abstract views: 21 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.29.939
PDF (Українська)
QUALITY ANALYSIS OF PINK NOISE GENERATORS
Valentyn Romaniuk , Artem Platonenko
789-799
Abstract views: 12 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.940
PDF (Українська)
TESTING NEURAL NETWORK MODELS FOR SOLVING THE PROBLEM OF DETECTING INFECTED PCS BASED ON DIGITAL TRACES
Ivan Chernihivskyi, Larysa Kriuchkova
800-817
Abstract views: 18 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2025.29.941
PDF (Українська)
MODIFICATION OF THE MODEL FOR CALCULATING THE LEVEL OF CYBER SECURITY OF CRITICAL INFRASTRUCTURE FACILITIES
Diana Yudina
818-836
Abstract views: 19 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2025.29.943
PDF (Українська)
METHOD FOR ASSESSING THE RESILIENCE OF CRITICAL INFORMATION INFRASTRUCTURE OBJECTS OF THE STATE
Viktoriia Sydorenko
837-853
Abstract views: 12 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2025.29.944
PDF (Українська)
COGNITIVE APPROACH IN INFORMATION AND CYBER SECURITY
Svitlana Shevchenko, Yuliia Zhdanovа, Arina Harkushenko
854-866
Abstract views: 10 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2025.29.945
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue