Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Ukrainian Information Security Research Journal
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 26 No. 1 (2024): Ukrainian Information Security Research Journal
Vol. 26 No. 1 (2024): Ukrainian Information Security Research Journal
Published:
2024-06-26
THE PROBLEM OF ENSURING THE SECURITY OF PROFESSIONAL RADIO COMMUNICATION SYSTEMS IN CRITICAL INFRASTRUCTURES
Yaroslav Shavlovsky, Serhii Perederii, Volodymyr Bychkov
8-14
PDF (Українська)
MATHEMATICAL APPARATUS FOR FINDING THE OPTIMAL CONFIGURATION OF A SECURED COMMUNICATION NETWORK WITH A GIVEN NUMBER OF SUBSCRIBERS
Oleksandr Laptiev , Al-Dalvash Ablullah Fowad
14-21
PDF (Українська)
STUDY OF THE RELATIONSHIP BETWEEN SEMANTIC PARAMETERS FOR THE FIELD OF SECURITY OF ACCESS SYSTEMS
Anatolii Davydenko , Olena Vysotska , Mykhailo Prygara , Volodymyr Bychkov
21-29
PDF (Українська)
METHOD OF DETECTING FALSE INFORMATION BASED ON EXPERT ASSESSMENT
Nataliya Lukova-Chuiko, Tetiana Laptievа
29-35
PDF (Українська)
ARITHMETIC OF ASYMMETRIC CRYPTOSYSTEMS IN THE FIELD OF COMPLEX NUMBERS
Andrii Aliluiko, Mykhailo Kasianchuk
35-43
PDF (Українська)
DEVELOPMENT OF A MODEL FOR THE PROTECTION OF PERSONAL DATA IN SOCIAL NETWORKS
Serhii Laptiev
43-50
PDF (Українська)
METHODOLOGICAL APPROACH FOR ASSESSING THE CYBER RESILIENCE OF INFORMATION AND TELECOMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS UNDER NATIONAL SECURITY THREATS
Volodymyr Shypovskyi
50-58
PDF (Українська)
REAL-TIME FALSE INFORMATION DETECTION PREDICTION ACCURACY MODEL
Serhii Zybin, Andrii Sobchuk, Volodymyr Rovda
58-63
PDF (Українська)
RESEARCH AND ANALYSIS OF PROBLEMS AND CHALLENGES IN ENSURING CYBERSECURITY IN CLOUD COMPUTING
Marta Korol , Ivan Opirskyy
63-71
PDF (Українська)
CYBERSECURITY CHALLENGES AND OPPORTUNITIES IN THE INTERNET OF THINGS (IOT): COMBINING ARTIFICIAL INTELLIGENCE, IOT AND CYBERSECURITY
Oleksandr Ulichev, Roman Yarovy, Kostyantyn Zadorozhny
71-80
PDF (Українська)
RESEARCH ON THE EFFICIENCY OF COMBINED EMBEDDINGS FOR FACIAL VERIFICATION
Denys Khanin , Viktor Otenko
80-89
PDF (Українська)
MULTIASPECTNESS AND STRATEGIC PLANNING IN DEVELOPING MULTI-OBJECTIVE MODELS FOR SOFTWARE QUALITY ASSESSMENT.
Anton Shantyr , Olha Zinchenko , Maksym Fesenko , Viktor Vyshnivskyi
89-101
PDF (Українська)
DEVELOPMENT OF EFFECTIVE WEB SECURITY MEASURES FOR THE NETWORK BY CONDUCTING PENETRATION TESTING USING THE OWASP FRAMEWORK
Mariia Kozlovska , Andrian Piskozub
101-110
PDF (Українська)
ALGORITHM FOR APPLICATION OF BAYES' THEOREM FOR DETECTION OF THREATS IN INFORMATION SECURITY SYSTEMS
Serhiy Gluhov, Igor Polovinkin, Maksym Kuzmenko , Vitaly Ponomarenko
110-117
PDF (Українська)
MATHEMATICAL FUNDAMENTALS OF ALGEBRAIC LATTICIES AND THEIR APPLICATION IN QUANTUM CRYPTOLOGY
Andriy Kozhukhivskyi , Oleksandr Khimich, Oleksandr Potii , Yuriy Horbenko , Olga Kozhuhivska , Yuryi Borsukovskiy
117-129
PDF (Українська)
JUSTIFICATION OF THE PROBABILITY OF DETERMINING THE PRESENCE OF SIGNALS IN THE ENVIRONMENT OF THEIR PROPAGATION
Serhiy Ivanchenko, Vasyl Nekoz
129-135
PDF (Українська)
STUDY OF RESISTANCE TO ATTACKS OF REPRODUCING REMOTE CONTROL PROTOCOLS USING THE 433 MHz RADIO CHANNEL
Olha Mykhaylova , Stefankiv Artem
135-147
PDF (Українська)
SECURITY SYMBOLS: INTEGRATING CRYPTOGRAPHY WITH CYBER SECURITY TO PROTECT DIGITAL SYSTEMS
Kateryna Mykhailyshyn , Ivan Opirskyy
147-157
PDF (Українська)
MODEL OF THE FACIAL RECOGNITION PROCEDURE MODEL AND THE IRIS OF THE EYE DURING BIOMETRIC AUTHENTICATION OF PERSONNEL OF CRITICAL INFRASTRUCTURE FACILITIES USING NEURAL NETWORK TOOLS.
Oleksandr Korchenko, Oleh Tereikovskyi
157-170
PDF (Українська)
FEATURES OF USING AMAZON INSPECTOR TO IDENTIFY VULNERABILITIES OF CLOUD APPLICATIONS
Andrii Partyka, Bohdan Nedodus
170-179
PDF (Українська)
METHOD OF ANALYSIS OF OUTGOING TRAFFIC PACKAGE SIGNATURES
Nataliia Petliak, Yuliia Khokhlachova
179-187
PDF
ANALYSIS OF THE CURRENT STATE OF CYBERATTACKS IN UKRAINE DURING THE WAR
Sviatoslav Khramov , Ivan Opirskyy
187-196
PDF (Українська)
NETWORK WARS – MODERN WARS
Volodymyr Artemov, Volodymyr Khoroshko
196-207
PDF (Українська)
HARNESSING BLOCKCHAIN AND EBPF FOR IMMUTABLE AUDIT OF SYSTEM EVENTS: A TECHNOLOGICAL CONVERGENCE APPROACH
Pavlo Hlushchenko, Valerii Dudykevych
207-213
PDF
SECURE DATA STORAGE USING THE ETHEREUM BLOCKCHAIN TECHNOLOGY
Oleh Harasymchuk , Yurii Nakonechnyi , Taras Lukovskyy , Roman Andriiv , Taras Nakonechnyi
213-220
PDF (Українська)
Language
English
Українська