Skip to main content Skip to main navigation menu Skip to site footer
Collection "Information Technology and Security"
  • About
    • Journal Summary
    • Focus and Scope
    • Sections
    • Publication Frequency
    • Peer Review Process
    • Open Access Policy
    • Privacy Statement
  • Editorial Team
  • Editorial board
  • Current
  • Archives
  • Submissions
  • Announcements
  • Contact
Search
  • Register
  • Login
Search
  1. Home /
  2. Search

Search

Advanced filters

Advanced filters

cybersecurity Löschen
Order results by:   
0 - 0 of 28 items > >> 

Sustainable development of the system of formal cyber education: reflection of modern concepts

Oleksandr Puchkov, Оlena Uvarkina
60-68
2023-06-29

Аnalysis of the factors influencing condition cybersecurity of information system of object of the critical infrastructure

Serhii Honchar, Hennadii Leonenko
262-268
2016-12-31

Сyberwar as a systemic challenge to Ukraine's cybersecurity

Viktor Horlynskyi, Borys Horlynskyi
118-133
2025-05-20

Using EBPF to identify ransomware that use DGA DNS queries

Danyil Zhuravchak, Eduard Kiiko, Valeriy Dudykevych
166-174
2023-12-28

Mathematical model for optimising the contemporary process of training specialists in the field of cybersecurity and information protection

Serhii Horlichenko, Anastasiia Horlichenko
210-218
2024-12-26

Functional model of cybersecurity situation center

Artem Zhylin, Mykola Khudyncev, Maksym Litvinov
51-67
2018-12-30

Directions for strengthening the protection of software processing state electronic information resources and used at critical infrastructure facilities

Olha Shevchuk, Artem Zhylin, Artem Mykytiuk, Anatolii Minochkin
54-67
2024-06-27

Use of large language models to identify fake information

Dmytro Lande, Vira Hyrda
236-242
2024-12-26

Information-telecommunication system, conceptual model of cyberspace and cybersecurity

Ihor Yakoviv
134-144
2017-12-31

Determination of components of route hijack risk by Internet connections topology analysis

Vitalii Zubok
232-239
2020-12-30

Analysis of key factors of formation of the system of competences of professionals in the field of cybersecurity

Viktor Horlynskyi, Borys Horlynskyi
219-231
2021-12-30

Application of large language models for intelligent expansion of semantic networks

Dmytro Lande, Oleksandr Rybak
89-99
2025-05-20

Development detection cyberatacs methods in the critical infrastructure objects information systems overview and prospects

Serhii Serheiev, Andrii Davydiuk, Alla Onyskova
91-99
2021-06-24

Cybersecurity as a component of information security of Ukraine

Viktor Horlynskyi, Borys Horlynskyi
136-148

System for analysing of big data on cybersecurity issues from social media

Dmytro Lande, Oleksandr Puchkov, Ihor Subach
4-18
2020-07-09

Search for high-probability differential characteristics of the lightweight block cipher algorithm present with non-standard substitution blocks

Valerii Zakusilo, Nataliia Kuchynska, Serhii Koniushok
44-53
2024-06-27

Information technology for orchestration of the cybersecurity training situation center cyber range virtual environment

Ivan Horniichuk, Mykhailo Shelelo, Artem Mykytiuk, Volodymyr Onishchenko
283-296
2024-12-26

Filter generators with increased resistance against algebraic attacks

Kateryna Vorobei, Anton Alekseychuk
149-155
2023-12-28

Ontological approach to big data analytics in cybersecurity domain

Anatoly Gladun, Katerina Khala, Ihor Subach
120-132
2020-12-30

Lexical method for solving a multicriteria problem of selecting a SIEM for building a situational center for cybersecurity

Ihor Subach, Volodymyr Kubrak
27-38
2023-06-29
0 - 0 of 28 items > >> 
English Українська

Make a Submission

Make a Submission

Information

  • For Readers
  • For Authors
  • For Librarians
ISSN 2411-1031 (Print), ISSN 2518-1033 (Online)
More information about the publishing system, Platform and Workflow by OJS/PKP.