Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Ukrainian Scientific Journal of Information Security
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 30 No. 2 (2024): Ukrainian Scientific Journal of Information Security
Vol. 30 No. 2 (2024): Ukrainian Scientific Journal of Information Security
Published:
2024-09-03
Software & Hardware Architecture Security
UNCERTAINTY IN EVALUATING QUANTITATIVE QUALITY CHARACTERISTICS OF SOFTWARE
Anton Shantyr , Olha Zinchenko , Yevhen Chychkarоv , Oleksandr Vyshnivskyi
202-211
JUSTIFICATION OF THE DECISION SCHEME FOR ASSESSING THE PROBABILITY OF DETECTING ELECTROMAGNETIC SIGNALS WITH THE PURPOSE OF PREVENTING THEIR DETECTION
Serhiy Ivanchenko, Vasyl Nekoz
212-219
Business Intelligence & Knowledge Management
MODELLING OF PSYCHOLOGICAL IMPACT TAKING INTO ACCOUNT NEUROPSYCHOLOGICAL PROCESSES
Yurii Pribyliev , Serhii Bazarnyi
220-226
E-governance Security
BLOCKCHAIN AS A TOOL FOR TRANSPARENCY AND PROTECTION OF GOVERNMENT REGISTRIES
Valeriia Balatska , Ivan Opirskyy
221-230
Cybersecurity & Critical Information Infrastructure Protection (CIIP)
MODEL FOR ASSESSMENT OF CYBER RESILIENCE OF INFORMATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS UNDER THE INFLUENCE OF HYBRID CYBER ATTACKS USING MACHINE LEARNING ALGORITHMS
Володимир Шиповський
231-241
ARTIFICIAL INTELLIGENCE: CYBERSECURITY OF THE NEW GENERATION
Yulian Vavryk, Ivan Opirskyy
242-254
ANALYSIS OF COMPUTER VIRUSES CREATED USING ARTIFICIAL INTELLIGENCE
Serhii Lizunov , Maksym Vereshchaka , Evgenij Filobok
255-259
THE INFLUENCE OF NEURAL NETWORKS ON THE DEVELOPMENT OF CYBER SECURITY IN THE CONDITIONS OF REGULATORY CHANGES
Oleksandr Kushnerov , Iryna Pozovna, Vladyslav Sokol
260-269
ANALYSIS OF THE IMPACT OF SHADOW IT ON THE ENTERPRISE CLOUD INFRASTRUCTURE
Yevhenii Martseniuk, Andrii Partyka
270-278
ANALYSIS OF MODELS AND METHODS FOR ASSESSING THE STATE OF CYBERSECURITY OF CLOUD SERVICES OF INFORMATION INFRASTRUCTURE OBJECTS
Ihor Ivanchenko, Yevhenii Pedchenko
279-287
METHOD OF OPTIMIZING THE BLOCKING MEANS NUMBER OF ACOUSTIC INFORMATION LEAKAGE CHANNELS AT INFORMATION ACTIVITY OBJECT
Ihor Humeniuk , Dmytro Kosterev , Viktor Sheihas
288-298
Cryptology
FORMALIZED SCIENTIFIC PROBLEM STATEMENT FOR THE DEVELOPMENT OF A SYMMETRIC CRYPTOGRAPHIC SYSTEM FOR PROTECTING VOICE INFORMATION.
Olha Hryshchuk
299-305
TRANSITION TO POST-QUANTUM CRYPTOGRAPHY: CHALLENGES, STANDARDIZATION, AND PROSPECTS.
Pavlo Vorobets, Andriy Horpenyuk, Ivan Opirskyy
306-315
CRYPTO-CODE CONSTRUCTIONS ON LDPC CODES PROPERTIES ASSESSMENT
Stanislav Milevskyi, Olha Korol, Olha Hryshchuk , Tetiana Laptievа, Serhii Yevseiev
316-327
KEEPASS AS A PASSWORD AND DATA SECURITY MANAGER
Oleh Harasymchuk , Oleh Chentsov
328-334
Steganography & Steganalysis
ATTACK SCENARIOS ON SYSTEM OF REMOTE EDUCATION
Oleksandr Kireienko
335-343
Privacy & Protection from Identity Theft
MODEL OF THE FACIAL RECOGNITION PROCEDURE MODEL AND THE IRIS OF THE EYE DURING BIOMETRIC AUTHENTICATION OF PERSONNEL OF CRITICAL INFRASTRUCTURE FACILITIES USING NEURAL NETWORK TOOLS.
Oleksandr Korchenko, Oleh Tereikovskyi
344-352
Information Security Management
ANALYSIS OF THE POSSIBILITIES OF USING INTEGRATED INFRASTRUCTURE MONITORING SYSTEMS
Serhii Lizunov , Yevhenii Filobok , Maksym Vereshchaka
353-357
Language
English
Українська
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems