Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 3 No. 31 (2025): Cybersecurity: Education, Science, Technique
Vol. 3 No. 31 (2025): Cybersecurity: Education, Science, Technique
DOI:
https://doi.org/10.28925/2663-4023.2025.31
Published:
2025-12-16
Articles
RESEARCH OF CLOUD TECHNOLOGIES AND ARTIFICIAL INTELLIGENCE METHODS FOR THE IMPLEMENTATION OF TECHNOLOGICAL PROCESSES IN CRITICAL INFRASTRUCTURE OF THE STATE
Tetiana Smirnova
8-26
Abstract views: 0 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.31.963
PDF (Українська)
METHOD OF HIDING INFORMATION USING THE AES ENCRYPTION ALGORITHM AND THE LSB STEGANOGRAPHIC METHOD WITH PROTECTION AGAINST CROPPING AND STEGANALYSIS
Tamara Radivilova, Vadym Chakrian, Arkadii Snihurov, Ihor Dobrynin, Dmytro Ageyev, Serhii shenychnykh, Svitlana Shtangei
27-42
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.997
PDF (Українська)
SEMI-AUTOMATED MULTI-STANDARD CYBER MATURITY ASSESSMENT TOOL BASED ON NIST CSF 2.0, ISO/IEC 27001:2022, COBIT 2019 AND CIS CONTROLS V8
Svitlana Shevchenko, Yuliia Zhdanovа, Oleksii Kiia
43-60
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1004
PDF (Українська)
ANALYSIS OF THE EFFICIENCY OF DATA STRUCTURES AND DATABASES IN DISTRIBUTED SYSTEMS BASED ON PYTHON, JAVA AND BLOCKCHAIN TECHNOLOGIES
Andrii Aronov, Artur Havor, Mykola Hertsiuk, Kateryna Hordiienko, Dmytro Nishchemenko
61-70
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.996
PDF (Українська)
A GAME-THEORETIC MODEL OF THE INTERACTION OF E-COMMERCE ENTERPRISES UNDER NETWORK EXTERNALITIES
Oleksandr Kharchenko, Valentyn Yaremych
71-85
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.949
PDF (Українська)
RESEARCH ON WEB APPLICATION FIREWALL BYPASS MECHANISMS
Ivan Tyshyk
86-99
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1008
PDF (Українська)
KNOWLEDGE GRAPH-BASED MODELING OF WEB APPLICATIONS
Serhii Romanenko, Yevhenii Redziuk, Oleksandr Holub
100-112
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1005
PDF (Українська)
INFORMATION THREATS AND METHODS OF ENSURING SECURITY IN MODERN ONLINE GAMES
Orest Polotai, Taras Brych, Artur Tkachenko, Valentina Yashchuk, Bohdana Fedyna
113-128
Abstract views: 2 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1009
PDF (Українська)
CLOUD PLATFORMS AS THE KEY TO EFFECTIVE STORAGE AND ANALYSIS OF IOT DATA
Ivan Kukulevskyi, Ievgenii Sokyrka, Andrii Tolbatov
129-139
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1003
PDF (Українська)
APPROACHES TO SECURE DATA STORAGE AND PROCESSING BASED ON UUID IDENTIFIERS: THE GRAPHICAL CONVERSION METHOD
Yaroslava Momryk
140-154
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1010
PDF (Українська)
METHODOLOGY OF BALANCED ASSIGNMENT OF STORAGE PLACES FOR GOODS BASED ON TIME CHARACTERISTICS OF DEMAND
Andrii Balvak, Natalia Lashchevska
155-168
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1002
PDF (Українська)
MODELS AND METHODS FOR WIRELESS DEVICE IDENTIFICATION BASED ON RADIO FREQUENCY CHARACTERISTICS: A COMPREHENSIVE ANALYSIS OF MODERN RF-FINGERPRINTING APPROACHES
Heorhii Loban, Taras Lukovskyy
169-187
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1012
PDF (Українська)
FORMATION OF COMPETENCES OF FUTURE CYBERSECURITY SPECIALISTS BY THE “STUDENT CYBERBRIGADES” INITIATIVE
Vadym Kalchenko, Volodymyr Liubchak, Viktor Obodiak, Ihor Puhach
188-197
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1006
PDF (Українська)
A CONTEXT-AWARE APPROACH TO ORGANIZING NETWORK SECURITY POLICIES IN A ZERO TRUST ARCHITECTURE
Roman Syrotynskyi
198-216
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1013
PDF (Українська)
EXPERIMENTS AND PRACTICAL SOLUTIONS FOR BUILDING A TEST ENVIRONMENT TO ASSESS APPLICATION-LEVEL SECURITY
Yevhenii Skuratovskyi, Andriy Аnosov, Vitalii Strelnikov, Mykola Kucheriavyi
217-226
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1014
PDF (Українська)
RESEARCH OF ARTIFICIAL INTELLIGENCE TOOLS FOR INTELLIGENT DATA ANALYSIS
Iryna Lysenko, Roman Minailenko, Serhii Smirnov, Kostiantyn Buravchenko, Nataliia Yakymenko, Oleksii Smirnov
227-241
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1022
PDF (Українська)
PARALLEL PROCESSING IN DYNAMIC HASH STRUCTURES AND MODELING THEIR PERFORMANCE
Pavlo Skladannyi, Yuliia Kostiuk, Svitlana Rzaeva , Nataliia Mazur
242-269
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1015
PDF (Українська)
COMPLEX CRYPTOGRAPHIC EVALUATION OF A HYBRID GENERATOR OF PSEUDORANDOMS BASED ON AUDIO ENTROPY AND NONLINEAR BOOLEAN FUNCTIONS
Mykhailo Kikh, Elena Niemkova
270-282
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1020
PDF (Українська)
METHOD FOR INTEGRATING INFORMATION SECURITY POLICIES, STANDARDS AND PROTOCOLS INTO THE DEVELOPMENT OF A COMPREHENSIVE INFORMATION SECURITY SYSTEM IN AN ORGANIZATION
Valeriia Balatska, Andriy Ivanusa, Ulyana Panovyk
283-297
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1021
PDF (Українська)
COMPREHENSIVE APPROACHES TO THE PROTECTION OF MODERN CORPORATE NETWORKS
Volodymyr Adamenko, Dmytro Kozlov , Serhii Korotkov , Vladyslav Mykolaienko
298-308
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1017
PDF (Українська)
MODERN CHALLENGES OF CYBERCRIME AND THE ROLE OF THE NATIONAL POLICE OF UKRAINE IN OVERCOMING THEM
Bohdan Makalish, Oleksandr Moiko, Vasil Luchyk
309-322
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.983
PDF (Українська)
HYBRID CYBERSECURITY STRATEGIES FOR WEB APPLICATIONS USING ARTIFICIAL INTELLIGENCE
Kostiantyn Savchuk
323-332
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.969
PDF (Українська)
ASSESSMENT OF STABILITY FACTORS OF INFORMATION SECURITY SYSTEMS USING REGRESSION ANALYSIS METHODS
Oksana Hlushak , Svitlana Semeniaka, Nadiia Zinchenko, Viktoriia Solomko
333-345
Abstract views: 0 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1023
PDF (Українська)
STEP-BY-STEP APPROACH TO IMPLEMENTING ZERO TRUST IN HYBRID CORPORATE SECURITY SYSTEMS
Ostap Horodytskyi, Ivan Opirskyy
346-366
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1029
PDF (Українська)
DISTINCTION BETWEEN THE ELECTRONIC COMMUNICATION SYSTEM OF THE NETWORK AND THE ELECTRONIC INFORMATION SYSTEM IN THE CONTEXT OF ENSURING CYBERSECURITY OF ORGANIZATIONS
Oleh Harasymchuk, Yurii Kasatkin
367-385
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1030
PDF (Українська)
METHODS OF WEB DEVELOPMENT AND TESTING OF DATA AND OBJECT TOKENIZATION FOR TRUSTED SOCIAL SERVICES IN DISTRIBUTED COMPUTER NETWORKS
Volodymyr Mikhav, Yelyzaveta Meleshko, Mykola Yakymenko, Viktor Bosko, Iryna Lysenko
386-404
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1027
PDF (Українська)
ANALYSIS OF CRYPTOCURRENCY DYNAMICS BASED ON CHARTS AND JAPANESE CANDLESTICKS
Arthur Dekhtyarchuk, Oksana Miskevych
405-413
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.982
PDF (Українська)
STRATEGY FOR PROTECTING PERSONAL DATA IN MACHINE LEARNING SYSTEMS
Mariia Pozdniakova
414-423
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1016
PDF
DEVELOPMENT OF AN AGENT FOR NOTIFICATION ANALYSIS BASED ON ARTIFICIAL INTELLIGENCE USING N8N AND ELASTIC SECURITY SOFTWARE
Oleksandr Volotovskyi, Roman Banakh, Andrian Piskozub
424-440
Abstract views: 2 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1031
PDF (Українська)
RESEARCH OF A HYBRID ACCOUNTING DATA MANAGEMENT SYSTEM BASED ON THE COMBINATION OF DID, IPFS, BLOCKCHAIN TECHNOLOGIES
Vasyl Poberezhnyk, Taras Nakonechnyi
441-459
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1033
PDF (Українська)
APPLICATION OF NEURAL NETWORKS FOR AUTOMATED TEXT AND SYMBOL RECOGNITION IN CYBERSECURITY TASKS
Nataliia Cherniiashchuk
460-471
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1032
PDF (Українська)
RESEARCH OF METHODS AND TOOLS FOR IMPROVING GIT LFS PROTOCOL SECURITY
Volodymyr Havryliak
472-482
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1040
PDF (Українська)
METHOD FOR CALCULATING ROAD SURFACES DAMAGE ON BORDER SECTIONS USING COMPUTER VISION
Dmytro Hyka, Olga Pavlova, Mykola Lysyi
483-498
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1025
PDF (Українська)
ECOSYSTEM OF INSTALLED MOBILE APPLICATIONS FOR IDENTIFYING BEHAVIORAL GROUPS AND ASSESSING DIGITAL RISK
Taras Fedynyshyn, Olha Partyka
499-511
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1041
PDF (Українська)
INTELLIGENT LEARNING SYSTEMS: TRANSFORMING TABULAR DATA OF EDUCATIONAL CONTENT IN THE ONTOLOGICAL MODEL
Kostiantyn Tkachenko, Olha Tkachenko, Oleksandr Tkachenko
512-527
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1043
PDF
EVALUATION OF THE SCALABILITY OF VOICE EMBEDDING MODELS IN BIOMETRIC SPEAKER VERIFICATION SYSTEMS
Khrystyna Ruda, Ihor Kos, Alina Akhmedova
528-540
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1042
PDF (Українська)
DIGITAL TECHNOLOGIES AS A TECHNICAL FOUNDATION FOR THE DEVELOPMENT OF SCALABLE E-SERVICES AND DIGITAL PLATFORMS
Svitlana Popereshnyak, Viktoriia Zhebka
541-558
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1053
PDF (Українська)
APPLICATION OF MARKOV CHAINS TO DEVELOP SCENARIOS FOR THE DEVELOPMENT OF LOCAL SOCIO-ECONOMIC SYSTEMS
Anatolii Pashko, Dmytro Diakon
559-569
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1039
PDF (Українська)
FEATURES OF RESEARCHING BEHAVIORAL DIGITAL TRACES IN DISTANCE LEARNING SYSTEMS
Alona Desiatko, Yevheniy Nikitenko, Valerii Hladkykh
570-578
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1054
PDF (Українська)
COMPARISON OF INTERNATIONAL AUDIT STANDARDS FOR INFORMATION SECURITY WITH AUTOMATION PERSPECTIVES
Oleksii Chalyi, Serhii Toliupa
579-588
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1046
PDF
DEEP LEARNING MODEL FOR PREDICTING COMPROMISED ACCOUNTS IN SECURITY EVENT MANAGEMENT SYSTEMS
Yevhen Zhyvylo, Yurii Kuchma
589-601
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1050
PDF (Українська)
FEDERATIVE GNN-XAI MODEL FORPREDICTING COMPROMISE OF ACCOUNT RECORDS IN ZERO TRUST ENVIRONMENT
Tatiana Fesenko, Yuliya Kalashnicova
602-619
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1049
PDF (Українська)
METHOD FOR DETECTING DANGEROUS DIGITAL RADIO SIGNALS
Oleksandr Laptіev, Yulia Khokhlachоva, Tetiana Laptievа, Vadym Stetsenko, Serhii Laptiev
620-634
Abstract views: 3 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1058
PDF
ROUTING IN MICROFRONTEND APPLICATIONS: ARCHITECTURAL APPROACHES, CHALLENGES AND SOLUTIONS
Olena Trofymenko , Serhii Manakov, Pavlo Chykunov, Yuliia Loboda, Yevhen Hurin
635-651
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1057
PDF (Українська)
TEST SEQUENCE FOR DETECTION AND ISOLATION OF INFECTED NODES OF THE INFOCOMMUNICATION NETWORK
Ivan Chernihivskyi, Larysa Kriuchkova
652-662
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1070
PDF (Українська)
DEVELOPMENT OF CRYPTOCODE CONSTRUCTIONS BASED ON ALGEBRAIC, LDPC, AND DAMAGE CODES
Sergii Dunaiev
663-678
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1061
PDF (Українська)
SYSTEMS ANALYSIS OF CYBERATTACK DYNAMICS AND PENETRATION TESTING PROCESSES USING A MULTILAYER RISK MODEL AND GRAPH-BASED STRUCTURES
Tetiana Savchenko, Lidiia Vlasenko, Mykhailo Pilat
679-697
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1056
PDF (Українська)
AI SYSTEM FOR CAREER GUIDANCE IN THE FIELD OF 3D GRAPHICS
Svitlana Spivak, Andrii Bondarchuk, Oleksii Cherevyk
698-709
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1065
PDF (Українська)
METHOD FOR DETECTING ATTACKS ON CORPORATE WEB APPLICATIONS BASED ON GRADIENT BOOSTING
Anna Boiko
710-716
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1062
PDF (Українська)
SYSTEMATISATION AND COMPARATIVE ANALYSIS OF AUTOMATED PENETRATION TESTING TOOLS FOR WEB APPLICATIONS
Volodymyr Khoma, Andrii Partyka, Dmytro Sabodashko
717-726
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1068
PDF (Українська)
A METHOD FOR CALCULATING THE GENERAL RESOURCE PATH OF DESTRUCTIVE CYBERATTACKS ON INDUSTRIAL OBJECTS OF CRITICAL INFRASTRUCTURE
Anyuta Khaver
727-740
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1064
PDF (Українська)
APPLICATION OF ARTIFICIAL INTELLIGENCE IN 3D MODELING BASED ON BLENDER
Yevhenii Bobryshev
741-751
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1071
PDF (Українська)
FAILURE PREDICTION METHOD FOR INTERNET OF THINGS NETWORKS USING MACHINE LEARNING
Kyryll Chuhreiev, Olena Voloshchuk
752-761
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1072
PDF (Українська)
METHODS AND MEANS OF BUILDUNG A COMPREHENSIVE INFORMATION SECURITY SYSTEM FOR A TYPICAL INFORMATION ACTIVITY OBJECT
Dmytro Zadvornyi, Valeriy Kozachok, Vyacheslav Cherevyk, Dmytro Bodnenko, Yurii Dobryshyn
762-772
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1073
PDF (Українська)
CYBER DEFENSE OF URBAN DIGITAL SYSTEMS: SCALING SIEM CORRELATION TO REDUCE INCIDENTS IN A WARTIME CITY
Pavlo Chernikov
773-780
Abstract views: 2 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1066
PDF
APPLICATION OF ONE-DIMENSIONAL CONVULSIVE NEURAL NETWORKS FOR IDENTIFICATION OF WEAK RADIOACTIVE SIGNALS IN DYNAMIC MONITORING SYSTEMS
Tetiana Nosenko, Iryna Mashkina, Iryna Melnyk
781-791
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1074
PDF (Українська)
THE ROLE OF RISK MANAGEMENT IN IMPROVING THE CYBER RESILIENCE OF AN ORGANISATION IN THE CONTEXT OF HYBRID THREATS
Svitlana Lehominova, Diana Prymachenko
792-800
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2025.31.1060
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue