Open Academic Journals Index
Advanced search
Open Academic Journals Index


Recently Added Issues

Journal of Computer Sciences Institute
Drugs in Context
Enfoque UTE
Infarma - Pharmaceutical Sciences



Register Journal



Visitors Counter

TodayToday
985
YesterdayYesterday
1653
This weekThis week
3975
Last WeekLast week
8488
This monthThis month
5537
Last monthLast month
39243
All daysAll days
4948473

Cybersecurity: Education, Science, Technique

Number 9, 2020

  • 6-23
    THE COMPLEXITY OF THE FUNCTIONAL SECURITY ASSESSMENT ALGORITHM FOR INFORMATION TECHNOLOGIES FOR THE CREATION OF WARRANTY AUTOMATED SYSTEMS
    Authors: Hennadii Hulak
    Number of views: 191
  • 24-36
    THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD
    Authors: Anna Ilyenko , Sergii Ilyenko , Diana Kvasha
    Number of views: 211
  • 37-44
    ANALYSIS OF THE PROBLEMS OF USE OF ELECTRONIC RELIABLE SERVICES IN THE ARMED FORCES OF UKRAINE
    Authors: Yuliia Chernysh, Irina Maltseva, Nataliya Palamarchuk
    Number of views: 169
  • 45-58
    CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS
    Authors: Valerii Lakhno, Borys Husiev, Andrii Blozva, Dmytro Kasatkin, Tetiana Osypova
    Number of views: 175
  • 59-68
    ANALYSIS OF THE USE OF CLOUD SERVICES FOR FISHING ATTACKS
    Authors: Ivan Opirskyy, Andrii Vynar
    Number of views: 184
  • 69-84
    DEVELOPMENT OF ALOGORITHM FOR ENCRYPTION OF MESSAGES IN THE WIRELESS SENSOR NETWORK
    Authors: Oleksandr Belei, Oksana Svatiuk
    Number of views: 177
  • 85-92
    CYBER SECURITY IS ONE OF THE MOST IMPORTANT CONSTITUENTS OF THE ENTIRE SYSTEM OF PROTECTION IN THE ARMED FORCES OF UKRAINE
    Authors: Irina Maltseva, Yuliya Chernysh , Оleksii Cherednichenko
    Number of views: 239
  • 93-103
    AUTOMATIC PILOT SYSTEM FOR UNMANNED OF AIRCRAFT IN THE ABSENCE OF RADIO COMMUNICATION
    Authors: Tetyana Shabelnik , Serhii Krivenko , Olena Koneva
    Number of views: 195
  • 104-114
    MODEL OF FORMATION OF STUDY EXAMPLES OF THE NEURAL NETWORK INTENDED FOR THE ANALYSIS OF THE KEYBOARD HANDWRITING
    Authors: Liudmyla Tereikovska
    Number of views: 201
  • 115-125
    TRANSFORMANTS CODING TECHNOLOGY IN THE CONTROL SYSTEM OF VIDEO STREAMS BIT RATE
    Authors: Volodymyr Barannik, Yurii Babenko , Valeriy Barannik , Valerii Yroshenko , Sergii Shulgin
    Number of views: 167
  • 126-139
    USE OF PSEUDO NOISE CODING SEQUENCE CYCLIC SHIFTS FOR TELECOMMUNICATION CHANNEL PERFORMANCE IMPROVEMENT
    Authors: Oleksandr Pliushch
    Number of views: 161
  • 140-148
    FEATURES OF CONSTRUCTION AND BASIC DIRECTIONS OF DEVELOPMENT OF VIRTUAL DIGITAL ASSISTANTS
    Authors: Oleksandra Tsyra, Nataliia Punchenko, Oleksii Fraze-Frazenko
    Number of views: 172
  • 149-158
    REQUIREMENTS ANALYSIS METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS
    Authors: Vasyl Tsurkan
    Number of views: 215
  • 159-169
    APPLICATION OF NI MULTISIM ENVIRONMENT IN THE PRACTICAL SKILLS BUILDING FOR STUDENTS OF 125 "CYBERSECURITY" SPECIALTY
    Authors: Volodymyr Buriachok , Nataliia Korshun , Svitlana Shevchenko , Pavlo Skladannyi
    Number of views: 234
  • 170-181
    BASIC ASPECTS OF CONFIDENTIAL INFORMATION SECURITY IN CRITICAL INFORMATION INFRASTRUCTURE OBJECTS
    Authors: Sergiy Gnatyuk, Viktoriia Sydorenko, Yuliia Sotnichenko
    Number of views: 197

Number 8, 2020

  • 6-21
    3- AND 5-ISOGENIES OF SUPERSINGULAR EDWARDS CURVES
    Authors: Anatoly Bessalov, Evgeniy Grubiyan, Volodymyr Sokolov, Pavlo Skladannyi
    Number of views: 205
  • 22-33
    METHODS AND MODELS OF CONSTRUCTION OF INFORMATION TECHNOLOGIES OF REMOTE MEASUREMENT OF NANOBRATION
    Authors: Hennadii Hulak, George Otto
    Number of views: 205
  • 34-48
    DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3
    Authors: Yurii Borsukovskyi
    Number of views: 332
  • 49-60
    ARCHITECTURE SECURITY PRINCIPLES OF THE ANDROID APPLICATIONS-BASED INFORMATION SYSTEM
    Authors: Roman Drahuntsov, Dmytro Rabchun, Zoreslava Brzhevska
    Number of views: 249
  • 61-72
    TELEGRAM OPEN NETWORK. COMPLEX ANALYSIS OF THE INNOVATIVE PROJECT AND ITS COMPONENTS
    Authors: Yulia Tkach, Arthur Bryhynets
    Number of views: 182
  • 73-84
    MATHEMATICAL MODEL FOR TRANSITIONAL PROCESSES IN JOSEPHSON MEMORY ELEMENTS
    Authors: Mykhailo Tyhanskyi, Andrii Partyka
    Number of views: 187
  • 85-96
    APPLIED AND METHODICAL ASPECTS OF USING HASH FUNCTIONS FOR INFORMATION SECURITY
    Authors: Yuliia Zhdanovа, Svitlana Spasiteleva , Svitlana Shevchenko, Kateryna Kravchuk
    Number of views: 228
  • 97-112
    APPLICATION OF THE CONVOLUTIONAL NEURAL NETWORKS FOR THE SECURITY OF THE OBJECT RECOGNITION IN A VIDEO STREAM
    Authors: Danylo Svatiuk, Oksana Svatiuk , Oleksandr Belei
    Number of views: 258
  • 113-123
    GENERAL DIFFERENTIAL-GAME MODEL OF POTENTIALLY DANGEROUS PATTERN OF CYBER-ATTACK
    Authors: Volodymyr Okhrimchuk
    Number of views: 215
  • 124-134
    PROSPECTIVE PROTECTION METHODS OF WINDOWS OPERATION SYSTEM
    Authors: Anna Ilyenko , Sergii Ilyenko , Tatiana Kulish
    Number of views: 236
  • 135-148
    DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD
    Authors: Valerii Lakhno, Dmytro Kasatkin, Andii Blozva, Maksym Misiura, Borys Husiev
    Number of views: 191
  • 149-164
    COMPARATIVE ANALYSIS OF IMAGE RECOGNITION METHODS OBTAINED FROM SENSORS OF THE VISIBLE SPECTRUM
    Authors: Volodymyr Hrytsyk , Mariya Nazarkevych , Andrij Dyshko
    Number of views: 202
  • 165-173
    MODEL OF VULNERABILITIES ANALYSIS OF SOCIO-TECHNICAL SYSTEMS TO THE SOCIAL ENGINEERING INFLUENCES
    Authors: Volodymyr Mokhor, Oksana Tsurkan, Rostyslav Herasymov, Olha Kruk, Valeriia Pokrovska
    Number of views: 191
  • 174-191
    METHODOLOGICAL ASPECTS OF DIGITAL TRANSFORMATION APPLIED TO PUBLIC SERVICES
    Authors: Oleg Burba, Yuriy Kopytin, Olga Pasichnyk, Andriy Piskun
    Number of views: 215
  • 192-201
    METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS FUNCTIONAL ANALYSIS
    Authors: Vasyl Tsurkan
    Number of views: 208

Number 7, 2020

  • 6-16
    RESEARCH OF CALLER ID SPOOFING LAUNCH, DETECTION, AND DEFENSE
    Authors: Volodymyr Buriachok, Volodymyr Sokolov, Mahyar Taj Dini
    Number of views: 173
  • 17-30
    THE LOAD BALANCING OF SELF-SIMILAR TRAFFIC IN NETWORK INTRUSION DETECTION SYSTEMS
    Authors: Tamara Radivilova, Lyudmyla Kirichenko, Maksym Tawalbeh, Petro Zinchenko, Vitalii Bulakh
    Number of views: 230
  • 31-42
    METHOD OF NEURAL NETWORK ANALYSIS OF VOICE SIGNAL
    Authors: Liudmyla Tereikovska
    Number of views: 195
  • 43-62
    RESEARCH OF CLOUDY TECHNOLOGIES AS А SERVICES
    Authors: Tetyana Smirnova, Liudmyla Polishchuk , Oleksii Smirnov, Kostiantyn Buravchenko, Andrii Makevnin
    Number of views: 338
  • 63-71
    TRANSFORMANTS CODING TECHNOLOGY IN THE CONTROL SYSTEM OF VIDEO STREAMS BIT RATE
    Authors: Volodymyr Barannik, Yuriy Ryabukha, Pavlo Hurzhii, Vitalii Tverdokhlib, Oleh Kulitsa
    Number of views: 198
  • 72-84
    AUTOMATED LOGISTIC FLOW SYSTEM FOR TRADING ENTERPRISE
    Authors: Svitlаnа Rzаiеvа , Dmуtrо Rzаiеv, Valeriy Kraskevich, Andrii Roskladka, Volodymir Gamaliy
    Number of views: 217
  • 85-94
    PROBLEMATIC ASPECTS OF PROVIDING REMOTE VIDEO SERVICES IN CRISIS SITUATION
    Authors: Volodymyr Barannik, Sergii Shulgin, Natalia Barannik, Yurii Babenko , Roman Puhachov
    Number of views: 202
  • 95-102
    INFORMATION PARAMETERS OF CODES THAT ARE SYNTHESIZED ON THE BASIS OF ONE MODULE
    Authors: Mikola Zaharchenko, Matin Hadzhyiev, Nariman Salmanov, Denis Golev, Natalya Shvets
    Number of views: 185
  • 103-114
    AN OPTIMIZATION OF STRUCTURES AND TRAFFIC DEVELOPMENT FOR TRANSMISSION OF INFORMATION IN PROTECTED CORPORATE NETWORKS. A QUANTITATIVE OPTIMIZATION
    Authors: Serhii Zybin
    Number of views: 229
  • 115-130
    WAVELET TRANSFORMATION ATEB-GABOR FILTERS TO BIOMETRIC IMAGES
    Authors: Mariya Nazarkevych, Yaroslav Voznyi, Sergiy Dmytryk
    Number of views: 212
  • 131-152
    SOFTWARE BITSLICED IMPLEMENTATION OF KALYNA CIPHER IS ORIENTED TO USE SIMD INSTRUCTIONS FOR MICROPROCESSORS WITH X86-64 ARCHITECTURE
    Authors: Yаroslav Sovyn, Volodymyr Khoma
    Number of views: 383
  • 153-164
    METHOD OF EVALUATION OF FUNCTIONAL SECURITY OF INFORMATION TECHNOLOGIES FOR CREATION OF WARRANTY AUTOMATED SYSTEMS
    Authors: Hennadii Hulak
    Number of views: 185

Number 10, 2020

  • 6-28
    CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES
    Authors: Hennadii Hulak, Volodymyr Buriachok, Pavlo Skladannyi, Lydia Kuzmenko
    Number of views: 152
  • 29-44
    THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS
    Authors: Andrii Halchenko, Sergiy Choporov
    Number of views: 173
  • 45-53
    PECULIARITIES OF PROJECT MANAGEMENT IN CYBER DEFENSE
    Authors: Andrii Andreichenko, Stanislav Нorbachenko, Oleh Dykyi
    Number of views: 175
  • 54-66
    ENSURING INFORMATION SECURITY IN WIRELESS SENSOR NETWORKS
    Authors: Andrii Karpenko, Tetiana Bondarenko, Viacheslav Ovsiannikov, Valerii Martyniuk
    Number of views: 177
  • 67-74
    MATURITY MODEL OF CYBER SECURITY SYSTEM OPPORTUNITIES AT CRITICAL INFRASTRUCTURE FACILITIES OF THE ES-C2M2 ENERGY SECTOR
    Authors: Yanina Roy, Olena Riabchun, Valeriy Yermoshin
    Number of views: 162
  • 75-87
    METHOD FOR PROTECTION TRAFFIC FROM INTERVENTION OF DPI SYSTEMS
    Authors: Anna Ilyenko , Sergii Ilyenko , Oleksandr Vertypolokh
    Number of views: 162
  • 88-97
    ANALYSIS OF THE USE OF SOFTWARE BAITS (HONEYPOTS) AS A MEANS OF ENSURING INFORMATION SECURITY
    Authors: Ivan Opirskyy, Sviatoslav Vasylyshyn , Andrian Piskozub
    Number of views: 163
  • 98-112
    APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM
    Authors: Iryna Litvinchuk, Ruslan Korchomnyi , Nataliia Korshun , Maksym Vorokhob
    Number of views: 150
  • 113-122
    MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS
    Authors: Valeriy Lakhno, Andriy Blozva, Maksym Misiura , Dmytro Kasatkin , Borys Gusev
    Number of views: 115
  • 123-134
    THE IMPROVEMENT OF NTRUENCRYPT PUBLIC KEY CRYPTOSYSTEM: DESIGN AND PERFORMANCE EVALUATION
    Authors: Anna Ilyenko , Sergii Ilyenko , Olena Prokopenko
    Number of views: 196
  • 135-143
    METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY
    Authors: Iryna Litvinchuk, Nataliia Korshun , Maksym Vorokhob
    Number of views: 129
  • 144-157
    ORGANIZATION OF PROTECTION OF KNOWLEDGE CONTROL RESULTS IN DISTANCE LEARNING SYSTEMS
    Authors: Oleh Harasymchuk, Ivan Opirskyy, Yaroslav Sovyn, Ivan Tyshyk, Yevhenij Shtefaniuk
    Number of views: 113
  • 158-168
    CONDUCTING A SWOT-ANALYSIS OF INFORMATION RISK ASSESSMENT AS A MEANS OF FORMATION OF PRACTICAL SKILLS OF STUDENTS SPECIALTY 125 CYBER SECURITY
    Authors: Svitlana Shevchenko, Yuliia Zhdanovа, Svitlana Spasiteleva , Pavlo Skladannyi
    Number of views: 184
  • 169-183
    CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES
    Authors: Serhii Tolіupa , Oleksandr Pliushch , Ivan Parkhomenko
    Number of views: 202
  • 184-196
    WORLD'S BEST PRACTICE ANALYSIS FOR CRITICAL INFORMATION INFRASTRUCTURE PROTECTION
    Authors: Sergiy Gnatyuk, Yuliia Polishchuk, Yuliia Sotnichenko, Dauriya Zhaksigulova
    Number of views: 142

Number 6, 2019

  • 6-18
    SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS
    Authors: Olexander Belej, Lohutova Tamara
    Number of views: 240
  • 19-31
    DECENTRALIZED IDENTITY AND CERTIFICATION SYSTEM
    Authors: Oleksandr Kurbatov, Pavlo Kravchenko, Nikolay Poluyanenko, Oleksiy Shapoval, Tetiana Kuznetsova
    Number of views: 175
  • 32-45
    IMPLEMENTATION OF XTEA ENCRYPTION PROTOCOL BASED ON IEEE 802.15.4 WIRELESS SYSTEMS
    Authors: Davyd Kurbanmuradov, Volodymyr Sokolov, Volodymyr Astapenya
    Number of views: 188
  • 46-56
    SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES
    Authors: Svitlana Kuznichenko, Iryna Buchynska
    Number of views: 198
  • 57-70
    MODEL FOR SUPPORTING DECISIONS OF A GROUP OF A SMART CITY PROJECT INVESTORS, TAKING INTO CONSIDERATION MULTIFACTORIALITY
    Authors: Valeriy Lakhno, Volodymyr Malukov, Dmytro Kasatkin, Andriy Blozva, Taras Litovchenko
    Number of views: 179
  • 71-81
    TESTING THE SECURITY ESP32 INTERNET OF THINGS DEVICES
    Authors: Oleksii Barybin, Elina Zaitseva, Volodymyr Brazhnyi
    Number of views: 235
  • 82-93
    SECURE SOFTWARE DEVELOPING RECOMMENDATIONS
    Authors: Viktoria Grechko, Tetiana Babenko, Larysa Myrutenko
    Number of views: 298
  • 94-104
    GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX
    Authors: Banovsha Mekhdiyeva, Guluzade Rustam, Liliia Ivanova, Natalia Korshun, Pavlo Skladannyi
    Number of views: 198
  • 105-111
    DEVELOPMENT OF OBJECT MOVEMENT ALGORITHM BY THE NEURAL NETWORK FOR THE CCTV SYSTEM
    Authors: Vitaliy Petlitsky, Svitlana Shevchenko, Nataliia Mazur
    Number of views: 195
  • 112-121
    DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 2
    Authors: Yurii Borsukovskyi
    Number of views: 193
  • 122-133
    SECURITY PROBLEMS OF UNIVERSAL DATA MANAGEMENT SYSTEMS
    Authors: Svitlana Spasiteleva, Yulia Zhdanovа, Ivan Chychkan
    Number of views: 322
  • 134-141
    METHODS OF SAFETY DOMESTIC SECURITY
    Authors: Anastasia Belova, Viktoria Onischenko
    Number of views: 206
  • 142-153
    GENERATION OF GABOR FILTERS BASED ON ATEB FUNCTIONS
    Authors: Maria Nazarkevich, Yaroslav Vozny
    Number of views: 230


1 2  Следующая страница  В конец
© 2013-2022, Open Academic Journals Index. All rights reserved.
Privacy PolicyTerms and ConditionsContact Us