Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Ukrainian Scientific Journal of Information Security
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 30 No. 1 (2024): Ukrainian Scientific Journal of Information Security
Vol. 30 No. 1 (2024): Ukrainian Scientific Journal of Information Security
Published:
2024-04-24
Network & Internet Security
ENSURING THE INFORMATION SECURITY OF THE ORGANIZATION WHEN IMPLEMENTING THE BYOD CONCEPT
Nataliia Kukharska, Andrii Lagun
6-11
PDF (Українська)
SECURITY AND DATA ACCESS CONTROL MODEL IN CLOUD SERVICES BASED ON THE IDENTITY AND ACCESS MANAGEMENT MECHANISM
Andrii Partyka, Yaryna Zakharova
12-20
PDF (Українська)
E-governance Security
SAFETY OF THE CENTER'S TECHNOLOGICAL FUNCTIONS INFORMATION SECURITY FOR HIGHER INVESTMENT
Valerii Dudykevych, Galyna Mykytyn, Zakhar Losev
21-28
PDF (Українська)
Software & Hardware Architecture Security
CONSTRUCTION OF A VERIFIABLE TEST SEQUENCE FOR ASSESSING THE TECHNICAL CONDITION OF OBJECTS WITH EMBEDDED SOFTWARE
Vasyl Kuzavkov, Viacheslav Solodovnyk, Yuliia Bolotiuk
29-36
PDF (Українська)
PROTECTING CRITICAL RESOURCES IN CLOUD ENVIRONMENTS THROUGH SECURITY AS CODE APPROACHES: SOLVING THE PROBLEM OF MISCONFIGURATIONS
Ivan Opirskyy, Oleksandr Vakhula
37-45
PDF (Українська)
DEVELOPMENT OF ALGORITHMS FOR OPTIMAL RECEPTION OF SIGNALS WITH HIGH MULTIPLE PHASE DISTRIBUTION MODULATION
Larisa Dakova, Serhii Dakov, Nazarii Blazhennyi
46-50
PDF (Українська)
Cybersecurity & Critical Information Infrastructure Protection (CIIP)
SOCIOCYBERPHYSICAL SYSTEM WIRELESS AIR NETWORK TOPOLOGY SYNTHESIS MODEL
Serhii Yevseiev, Nataliia Dzheniuk, Stanislav Milevskyi, Natalya Voropay, Roman Korolov
51-57
PDF
CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION
Andrii Tkachov, Roman Korolov, Irada Rahimova, Iryna Aksonova, Yelyzaveta Sevriukova
58-66
PDF
THE PSYCHOLOGICAL INFLUENCE OF ARTIFICIAL ELECTRONIC ACCOUNTS (BOTS) ON SOCIAL NETWORK AGENTS IN THE INTERESTS OF INFORMATION OPERATIONS
Serhii Bazarnyi, Nataliia Mykytiuk, Oleksandr Ternovyi
67-72
PDF (Українська)
NIST CSF 2.0: NEW CYBERSECURITY FRAMEWORK FROM THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY OF THE UNITED STATES
Artem Zhylin, Vladyslav Beliavsky, Oleksandr Bakalynsky
73-76
PDF (Українська)
PROVISION OF INFORMATION SECURITY IN CYBERSPACE
Volodymyr Khoroshko, Mykhailo Shelest, Yuliia Tkach, Ihor Diuba
77-81
PDF (Українська)
TEST CONFIGURATION OF THE OBJECT OF INFORMATION ACTIVITY FOR PRACTICING SKILLS IN FINDING TECHNICAL CHANNELS OF INFORMATION LEAKAGE
Michael Shelest, Taras Petrenko, Serhii Semendyay, Vladyslad Norokha
82-87
PDF (Українська)
ENHANCING THE LEVEL OF PROTECTION AND VIABILITY OF UNMANNED AVIATION DEVICES
Roman Kuten, Alina Akhmedova
88-94
PDF (Українська)
ASSESSMENT SYSTEM FOR ENHANCING CYBERSECURITY POSTURE OF CRITICAL INFRASTRUCTURE INSPECTION OBJECTS OF THE STATE
Oleksandr Korchenko, Eugenia Ivanchenko
95-99
PDF (Українська)
BUILDING A COMPREHENSIVE MULTI-LEVEL SECURITY MODEL FOR THE CYBER-PHYSICAL INTELLIGENT TRANSPORT SYSTEM
Valerii Dudykevych, Galyna Mykytyn, Dmytro Sydoryk
100-109
PDF (Українська)
METHODOLOGICAL APPROACHES TO THE RESEARCH OF THE PROBLEMS OF IMPLEMENTING STRATEGIC COMMUNICATIONS OF THE MINISTRY OF DEFENSE AND ARMED FORCES OF UKRAINE USING SOCIAL NETWORKS
Oleksandr Voytko, Kyrylo Petrenko, Roman Pylypenko, Tetyana Voytko
110-123
PDF (Українська)
Cryptology
METHODS OF CHOOSING A RANDOM NUMBER GENERATOR FOR MODELING STOCHASTIC PROCESSES
Yurii Shcherbina, Nadiia Kazakova, Oleksii Fraze-Frazenko, Oleh Domaskin
124-129
PDF
RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY
Alla Gavrilova, Iryna Aksonova, Yuliia Khokhlachova, Tetiana Milevska, Sergii Dunaiev
130-139
PDF
SYSTEMATIZATION OF SIGNS OF UNAUTHORIZED ACCESS TO CORPORATE INFORMATION BASED ON APPLICATION OF CRYPTOGRAPHIC PROTECTION METHODS
Olena Kryvoruchko, Yuliia Kostiuk, Alyona Desyatko
140-149
PDF (Українська)
SSL/TLS PROTOCOL ON POST-QUANTUM ALGORITHMS
Stanislav Milevskyi, Natalya Voropay, Olha Korol, Serhii Yevseiev, Iryna Aksonova
150-156
PDF
Steganography & Steganalysis
ATTACK SCENARIOS ON VIDEOHOSTING
Oleksandr Kireienko
157-165
PDF (Українська)
Privacy & Protection from Identity Theft
STRATEGIES AND INNOVATIVE APPROACHES TO DATABASE PROTECTION IN THE AGE OF GROWING CYBER THREATS
Oleh Harasymchuk, Oksana Buzhovych
166-178
PDF (Українська)
Organizational & Law Information Security
APPLICATION OF THE INNOVATIVE APPROACH IN THE MODERNIZATION OF HIGHER EDUCATION INSTITUTIONS OF THE SECURITY SERVICE OF UKRAINE
Yevhen Melenti, Serhii Yevseiev, Olha Korol, Stanislav Milevskyi, Vladyslav Khvostenko
179-189
PDF
Information Security Management
METHODS OF INFORMATION SECURITY RISK MANAGEMENT: ISO/IEC 27001 AND CIS CRITICAL SECURITY CONTROLS
Serhii Horlichenko
190-196
PDF (Українська)
Language
English
Українська
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems