Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique»
About the Journal
Editorial Board
Focus and Scope
Journal indexing
For Authors
Submissions
Peer Review Process
Publication Frequency
Fees
Contact
Policy
Open Access Policy
Copyright, Licensing & Deposit Policies
Copyright Notice
Privacy Statement
Correction and retraction policy
Policy on AI assisting tools
Ethics Policies
Editorial Ethics
Competing Interests
Screening for Plagiarism
Current
Archives
Search
Register
Login
Submissions
Home
/
Archives
/
Vol. 4 No. 32 (2026): Cybersecurity: Education, Science, Technique
Vol. 4 No. 32 (2026): Cybersecurity: Education, Science, Technique
НОМЕР В ПРОЦЕСІ ЗАВАНТАЖЕННЯ НА САЙТ.
DOI:
https://doi.org/10.28925/2663-4023.2026.32
Published:
2026-03-26
Articles
USING INDICATORS OF COMPROMISE FOR CYBERATTACK DETECTION
Nataliia Cherniiashchuk
8-19
Abstract views: 6 | PDF Downloads: 9
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1034
PDF (Українська)
FORMAL MODEL OF ADAPTIVE SELECTION OF CRYPTOGRAPHIC PARAMETERS FOR CHANNEL PROTECTION IN CORPORATE COMPUTER NETWORKS BASED ON DYNAMIC TRUST ASSESSMENT
Yuliia Kostiuk, Pavlo Skladannyi, Nataliia Mazur , Svitlana Rzaeva , Dmytro Hnatchenko, Ihor Honcharenko
20-44
Abstract views: 12 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1111
PDF (Українська)
CREATION OF AN AUTOMATED INFORMATION PROCESSING SYSTEM WITH RESTRICTED ACCESS “INTERNET OF THINGS IN A ‘SMART CITY’: THREATS – SECURITY TECHNOLOGIES” IN THE INDUSTRY 4.0 SPACE
Valerii Dudykevych, Halyna Mykytyn, Yaroslava Parchuk, Maksym-Stepan Terpeliuk
45-70
Abstract views: 5 | PDF Downloads: 8
DOI:
https://doi.org/10.28925/2663-4023.2026.32.917
PDF (Українська)
FEATURES OF MODERN STATE-SUPPORTED CYBEROPERATIONS AS A NEW FORM OF INTERSTATE CONFRONTATION
Tetiana Muzhanova, Svitlana Lehominova, Tetiana Kapeliushna, Yurii Shchavinsky, Mykhailo Zaporozhchenko
71-89
Abstract views: 21 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1116
PDF (Українська)
RISK CRITERIA AND ML ALGORITHMS FOR THREAT DETECTION IN A CLOUD ENVIRONMENT
Aziz Abibulaiev, Andrian Piskozub, Edem Atamuratov
90-118
Abstract views: 8 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1185
PDF (Українська)
EXPERIMENTAL EVALUATION OF THE EFFECTIVENESS OF HYBRID METHODS FOR DIGITAL FOOTPRINT ANALYSIS IN DETECTING ATYPICAL BEHAVIOR IN INFORMATION AND EDUCATIONAL SYSTEMS
Myroslav Lakhno
119-126
Abstract views: 8 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1109
PDF (Українська)
RESEARCH ON SPATIAL-FREQUENCY METHODS OF FILTERING AND JAMMING SUPPRESSION IN ELECTRONIC WARFARE COUNTERMEASURE SYSTEMS
Roman Bybyk, Artem Stefankiv
127-140
Abstract views: 6 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1186
PDF (Українська)
PHISHING DETECTION IN ELECTRONIC COMMUNICATION CHANNELS
Ihor Tereikovskyi, Liudmyla Tereikovska
141-153
Abstract views: 8 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1092
PDF (Українська)
SECURITY-AS-CODE APPROACH FOR AUTOMATING PCI DSS COMPLIANCE USING AUTONOMOUS AGENTS BASED ON LARGE LANGUAGE MODELS
Oleksandr Vakhula, Dmytro Marchuk
154-171
Abstract views: 3 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1187
PDF (Українська)
DEVELOPMENT OF METHODS FOR DETECTION OF FAKE NEWS BASED ON GRAPH THEORY ANALYSIS
Mariia Nazarkevych, Danyil Korotych, Roman Cholkan
172-187
Abstract views: 5 | PDF Downloads: 6
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1110
PDF (Українська)
EXTENSION OF OPEN POLICY AGENT FUNCTIONS USING FALCO
Dmytro Darienko, Nazariy Kohut
188-197
Abstract views: 2 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1188
PDF (Українська)
MULTI-AGENT APPROACH TO DATA PIPELINE STABILITY USING DISTRIBUTED STORAGE COORDINATION
Yuliia Loboda, Olena Trofymenko , Ihor Mykheliev, Oksana Haidaienko, Mykhaylo Vorona
198-213
Abstract views: 1 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1104
PDF (Українська)
DESIGN OF GRAPHIC HASHES WITH SALT BASED ON THE METHOD OF CODING OF UUID
Yaroslava Momryk
212-226
Abstract views: 2 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1089
PDF (Українська)
INFORMATION SECURITY OF CYBER-PHYSICAL SYSTEMS AS A FACTOR OF SERVICE QUALITY IN THE HOTEL AND RESTAURANT BUSINESS
Orest Polotai, Natalia Kukharska, Bohdana Polotai, Yulia Vityk
227-241
Abstract views: 3 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1103
PDF (Українська)
RESEARCH ON MACHINE LEARNING MODELS FOR TOXIC CONTENT DETECTION
Viktor Kolchenko, Dmytro Sabodashko, Kostiantyn Piataiev, Vladyslav Horodnyk, Ivan Shchudlo, Yuriy Khoma
242-258
Abstract views: 13 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1189
PDF (Українська)
UNSUPERVISED HUMAN EMOTION RECOGNITION VIA BODY POSE DYNAMICS BASED ON SELF-SUPERVISED CONTRASTIVE LEARNING
Tetiana Kysil, Olga Zinchenko
259-274
Abstract views: 2 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1006
PDF (Українська)
METHODS AND MEANS OF PROTECTING CRITICAL INFRASTRUCTURE FROM OSINT INTELLIGENCE IN WARTIME
Valeriia Ivkova, Andrii Leonov
275-288
Abstract views: 11 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1190
PDF (Українська)
DEVELOPMENT OF THE INTERACTIVE INTERFACE OF KORISTUVACH BASED ON DETERMINATIVE END MOORE AUTOMATICS
Anton Kostiuk, Serhiy Zaitsev, Vladislav Vasylenko , Lilia Zaitseva
289-297
Abstract views: 2 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1088
PDF (Українська)
INTEGRATION OF FINOPS AND SOC 2 CONTROLS IN THE SECURITY SYSTEM OF MULTI-CLOUD ENVIRONMENTS
Yevhenii Martseniuk, Oleh Deineka, Oleh Harasymchuk, Taras Lukovskyy
298-335
Abstract views: 17 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1191
PDF (Українська)
DETECTION OF STEGANOGRAPHY IN IMAGES USING LIGHTWEIGHT DEEP LEARNING MODELS
Nataliia Lashchevska, Yurii Mishkur
336-348
Abstract views: 10 | PDF Downloads: 5
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1086
PDF (Українська)
ASSESSING THE IMPACT OF ZERO TRUST ON INCIDENT LOCALIZATION IN CONTAINERIZED MICROSERVICE ENVIRONMENTS
Vitalii Molnar, Oleksii Hrushkovskyi
349-365
Abstract views: 6 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1192
PDF (Українська)
MULTI-LEVEL DATA PROTECTION IN LARAVEL APPLICATIONS
Roman Belous, Oleh Klymenkov
366-375
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1075
PDF (Українська)
ІНТЕГРАЦІЯ ШТУЧНОГО ІНТЕЛЕКТУ В ЖИТТЄВИЙ ЦИКЛ РОЗРОБКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ (SDLC)
Ivan Opirskyy, Maksym Melnychuk
376-404
Abstract views: 3 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1193
PDF (Українська)
QUANTITATIVE ASSESSMENT OF THE QUALITY AND ROBUSTNESS OF SELECTED STEGANOGRAPHIC ALGORITHMS
Tetiana Hryshanovych, Bohdan Butkevych
405-418
Abstract views: 3 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1105
PDF (Українська)
NETWORK ACCESS LIFECYCLE: A STRUCTURED APPROACH TO FIREWALL RULE GOVERNANCE IN ZERO TRUST ENVIRONMENTS
Roman Syrotynskyi, Ivan Tyshyk
419-430
Abstract views: 2 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1194
PDF (Українська)
IMPROVING PASSWORD POLICY AND USING MODERN PASSWORD MANAGERS TO ENHANCE CYBER RESILIENCE OF INFORMATION AND COMMUNICATION SYSTEMS
Roman Shtonda, Roman Zozulia, Olena Bokii
431-447
Abstract views: 4 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1114
PDF (Українська)
MODEL OF AN INCIDENT RESPONSE PLAN FOR INCIDENTS RELATED TO THE USE OF WEAK PSEUDORANDOM NUMBER GENERATORS
Danylo Buhai, Ihor Vlasiuk, Vitalii Susukailo, Yevhenii Kurii
448-462
Abstract views: 9 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1195
PDF (Українська)
SECURITY AUDIT OF LIGHTWEIGHT KUBERNETES CLUSTERS USING MULTICHAIN-BASED TRUST MECHANISMS
Igor Andrushchak, Viktor Kosheliuk
463-477
Abstract views: 2 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1097
PDF (Українська)
RETRIEVAL-AUGMENTED GENERATION FOR FORENSIC LEGAL ANALYSIS: INTEGRATION OF UKRAINIAN CRIMINAL CODE WITH MOBILE DEVICE EVIDENCE
Taras Fedynyshyn, Olha Partyka
478-488
Abstract views: 2 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1196
PDF
TEMPORAL INTERPRETATION OF QUANTUM DECOHERENCE IN INFORMATION SYSTEMS
Andrii Lemeshko, Viktor Krasnoshchok, Alona Desiatko
489-499
Abstract views: 8 | PDF Downloads: 3
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1117
PDF (Українська)
SECURITY OF COMPUTER NETWORKS IN CONDITIONS OF UNCERTAINTY
Volodymyr Akhromovych, Vadym Akhromovych, Volodymyr Sanchenko, Myroslav Areshkov
500-515
Abstract views: 1 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1078
PDF (Українська)
RICE AND ICE MODELS AS TOOLS FOR FORMALIZING PRIORITIZATION OF IT PRODUCT FUNCTIONALITY IN TRAINING FUTURE IT SPECIALISTS
Halyna Kuchakovska, Karyna Khorolska
516-531
Abstract views: 5 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1119
PDF (Українська)
INFORMATION OUTPUT CHANNELS – RESEARCH AND MODELING
Yuliya Chernish, Tetiana Tereshchenko, Katerina Tereshchenko
532-549
Abstract views: 1 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1113
PDF (Українська)
REDUCING THE VULNERABILITY LEVEL OF GARBAGE COLLECTION USING ARENA ALLOCATOR
Myroslav Shpak, Oleg Kurchenko, Yurii Shcheblanin
550-564
Abstract views: 3 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1096
PDF
METHOD OF ENSURING THE CONFIDENTIALITY OF SPEECH NEGOTIATIONS TAKING INTO ACCOUNT PSYCHOACOUSTIC MASKING
Oleksandr Laptiev, Serhiy Pogasiy , Ivan Parkhomenko, Tetiana Laptieva, Serhii Laptiev
565-572
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1095
PDF (Українська)
OPTIMIZING FACIAL RECOGNITION WITH THE CUDA ACCELERATED DLIB LIBRARY
Олексій Смірнов, Viktor Zaritskyi, Kostiantyn Buravchenko, Oksana Konoplitska-Slobodeniuk, Liliia Konstantynova, Nataliia Yakymenko , Serhii Smirnov
573-582
Abstract views: 6 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1154
PDF (Українська)
The IMPACT OF LARGE LANGUAGE MODELS ON THE TRANSFORMATIONS IN TRANSLATION OF INTERNATIONAL INFORMATION SECURITY STANDARDS: POTENTIAL AND RISKS
Yurii Dreis
583-597
Abstract views: 7 | PDF Downloads: 2
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1133
PDF (Українська)
ASSESSMENT OF THE VISUAL INTERFACE IMPACT ON THE EFFICIENCY OF DYNAMIC OBJECTS REMOTE CONTROL
Oleksandr Bushma, Oleksii Hubskyi
598-616
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1148
PDF (Українська)
RISKS AND VULNERABILITIES OF DIGITAL TWINS IN MANUFACTURING SYSTEMS DURING ENERGY CONSUMPTION OPTIMIZATION
Tetiana Savchenko, Yaroslav Bondar
617-632
Abstract views: 6 | PDF Downloads: 7
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1149
PDF (Українська)
EVALUATION OF BLOCKCHAIN NODE SECURITY AGAINST ECLIPSE ATTACKS AND TROJAN MALWARE USING DIFFERENTIAL GAME MODELS
Olha Hryshchuk, Ruslan Hryshchuk
633-653
Abstract views: 2 | PDF Downloads: 4
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1150
PDF (Українська)
INFORMATION TECHNOLOGY FOR UKRAINIAN-LANGUAGE FAKE NEWS DETECTION IN SOCIAL NETWORKS CYBERSPACE BASED ON MACHINE LEARNING AND NATURAL LANGUAGE PROCESSING METHODS
Marta Hrudzynska , Victoria Vysotska, Lyubomyr Chyrun
654-673
Abstract views: 2 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1120
PDF (Українська)
BLOCKCHAIN-ORIENTED APPROACH TO ENSURING TRACEABILITY AND VERIFIABILITY OF ISMS POLICY ENFORCEMENT
Valeriia Balatska
674-685
Abstract views: 6 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1136
PDF (Українська)
KLEPTORISK AS A DISTINCT CLASS OF DIGITAL TRUST RISK
Mykhailo Shelest , Yuliia Tkach
686-699
Abstract views: 4 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1197
PDF (Українська)
THE POTENTIAL OF ARTIFICIAL INTELLIGENCE FOR VIRTUALIZING ARTIFACTS OF WAR
Volodymyr Sadivnychyi, Volodymyr Liubchak, Zakhar Tovolzhanskyi
700-710
Abstract views: 1 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1048
PDF (Українська)
INTELLIGENT TECHNOLOGIES IN CYBERSECURITY: ANALYSIS OF THE POTENTIAL AND CHALLENGES OF THE APPLICATION OF ARTIFICIAL INTELLIGENCE
Anna Ilienko, Olha Kryvokulska, Olesia Yakovenko, Valentyna Teliushchenko
711-723
Abstract views: 1 | PDF Downloads: 1
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1139
PDF (Українська)
COMPARATIVE ANALYSIS OF DEEP AND MACHINE LEARNING METHODS FOR NETWORK INTRUSION DETECTION
Volodymyr Rykhva, Ganna Solodovnyk
724-734
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1115
PDF (Українська)
SOCIAL ENGINEERING AS A TOOL OF INFORMATION AND PSYCHOLOGICAL OPERATIONS IN THE CONTEXT OF ARMED CONFLICT
Olha Haborets
735-746
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1108
PDF (Українська)
THE HUMAN FACTOR IN CORPORATE DATABASE SECURITY: A SOCIO-BEHAVIORAL RISK ANALYSIS
Oleksii Rybalchenko
747-756
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1102
PDF (Українська)
ECONOMIC ASPECT OF MODELING INFORMATION SECURITY SYSTEMS USING MATHEMATICAL OPTIMIZATION METHODS
Olena Hladka, Ivan Karpovich, Andrii Palamarchuk
757-766
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1101
PDF (Українська)
COMPARATIVE ANALYSIS OF POLICY-BASED AND VALUE-BASED RL METHODS FOR LOCAL MOTION PLANNING OF UAVS
Roman Trembovetskyi, Inna Rozlomii
767-774
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1099
PDF (Українська)
SYSTEM-COGNITIVE MODELING OF INFECTION VECTORS WITH MALICIOUS CODE IN DISTRIBUTED INFORMATION ENVIRONMENTS AND FORMATION OF AN ADAPTIVE MULTILEVEL CYBER DEFENSE STRATEGY
Валентина Ящук, Artur Tkachenko, Bohdan Dmytruk
775-801
Abstract views: 0 | PDF Downloads: 0
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1094
PDF (Українська)
index
Language
English
Українська
Make a Submission
Make a Submission
counter
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems
Current Issue