Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Ukrainian Scientific Journal of Information Security
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
Vol. 30 No. 2 (2024): Ukrainian Scientific Journal of Information Security
Vol. 30 No. 2 (2024): Ukrainian Scientific Journal of Information Security
Published:
2024-09-03
Software & Hardware Architecture Security
UNCERTAINTY IN EVALUATING QUANTITATIVE QUALITY CHARACTERISTICS OF SOFTWARE
Anton Shantyr , Olha Zinchenko , Yevhen Chychkarоv , Oleksandr Vyshnivskyi
202-211
PDF (Українська)
JUSTIFICATION OF THE DECISION SCHEME FOR ASSESSING THE PROBABILITY OF DETECTING ELECTROMAGNETIC SIGNALS WITH THE PURPOSE OF PREVENTING THEIR DETECTION
Serhiy Ivanchenko, Vasyl Nekoz
212-218
PDF (Українська)
Business Intelligence & Knowledge Management
MODELLING OF PSYCHOLOGICAL IMPACT TAKING INTO ACCOUNT NEUROPSYCHOLOGICAL PROCESSES
Yurii Pribyliev , Serhii Bazarnyi
219-224
PDF (Українська)
E-governance Security
BLOCKCHAIN AS A TOOL FOR TRANSPARENCY AND PROTECTION OF GOVERNMENT REGISTRIES
Valeriia Balatska , Ivan Opirskyy
225-234
PDF (Українська)
Cybersecurity & Critical Information Infrastructure Protection (CIIP)
MODEL FOR ASSESSMENT OF CYBER RESILIENCE OF INFORMATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS UNDER THE INFLUENCE OF HYBRID CYBER ATTACKS USING MACHINE LEARNING ALGORITHMS
Володимир Шиповський
235-243
PDF (Українська)
ARTIFICIAL INTELLIGENCE: CYBERSECURITY OF THE NEW GENERATION
Yulian Vavryk, Ivan Opirskyy
244-255
PDF (Українська)
ANALYSIS OF COMPUTER VIRUSES CREATED USING ARTIFICIAL INTELLIGENCE
Serhii Lizunov , Maksym Vereshchaka , Evgenij Filobok
256-260
PDF (Українська)
THE INFLUENCE OF NEURAL NETWORKS ON THE DEVELOPMENT OF CYBER SECURITY IN THE CONDITIONS OF REGULATORY CHANGES
Oleksandr Kushnerov , Iryna Pozovna, Vladyslav Sokol
261-269
PDF (Українська)
ANALYSIS OF THE IMPACT OF SHADOW IT ON THE ENTERPRISE CLOUD INFRASTRUCTURE
Yevhenii Martseniuk, Andrii Partyka
270-280
PDF (Українська)
ANALYSIS OF MODELS AND METHODS FOR ASSESSING THE STATE OF CYBERSECURITY OF CLOUD SERVICES OF INFORMATION INFRASTRUCTURE OBJECTS
Ihor Ivanchenko, Yevhenii Pedchenko
281-288
PDF (Українська)
METHOD OF OPTIMIZING THE BLOCKING MEANS NUMBER OF ACOUSTIC INFORMATION LEAKAGE CHANNELS AT INFORMATION ACTIVITY OBJECT
Ihor Humeniuk , Dmytro Kosterev , Viktor Sheihas
289-296
PDF (Українська)
Cryptology
FORMALIZED SCIENTIFIC PROBLEM STATEMENT FOR THE DEVELOPMENT OF A SYMMETRIC CRYPTOGRAPHIC SYSTEM FOR PROTECTING VOICE INFORMATION.
Olha Hryshchuk
297-302
PDF (Українська)
TRANSITION TO POST-QUANTUM CRYPTOGRAPHY: CHALLENGES, STANDARDIZATION, AND PROSPECTS.
Pavlo Vorobets, Andriy Horpenyuk, Ivan Opirskyy
303-312
PDF (Українська)
CRYPTO-CODE CONSTRUCTIONS ON LDPC CODES PROPERTIES ASSESSMENT
Stanislav Milevskyi, Olha Korol, Olha Hryshchuk , Tetiana Laptievа, Serhii Yevseiev
313-323
PDF (Українська)
KEEPASS AS A PASSWORD AND DATA SECURITY MANAGER
Oleh Harasymchuk , Oleh Chentsov
324-329
PDF (Українська)
Steganography & Steganalysis
ATTACK SCENARIOS ON SYSTEM OF REMOTE EDUCATION
Oleksandr Kireienko
330-338
PDF (Українська)
Privacy & Protection from Identity Theft
MODEL OF THE FACIAL RECOGNITION PROCEDURE MODEL AND THE IRIS OF THE EYE DURING BIOMETRIC AUTHENTICATION OF PERSONNEL OF CRITICAL INFRASTRUCTURE FACILITIES USING NEURAL NETWORK TOOLS.
Oleksandr Korchenko, Oleh Tereikovskyi
339-347
PDF (Українська)
Information Security Management
ANALYSIS OF THE POSSIBILITIES OF USING INTEGRATED INFRASTRUCTURE MONITORING SYSTEMS
Serhii Lizunov , Yevhenii Filobok , Maksym Vereshchaka
348-352
PDF (Українська)
Language
English
Українська
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems