Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Search
Search
Search articles for
Advanced filters
Published After
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Advanced filters
Keyword
cybersecurity
Löschen
Search
Order results by:
Relevance
Author
Issue
Publication Date
Article Title
Ascending
Descending
0 - 0 of 28 items
>
>>
Sustainable development of the system of formal cyber education: reflection of modern concepts
Oleksandr Puchkov, Оlena Uvarkina
60-68
2023-06-29
Аnalysis of the factors influencing condition cybersecurity of information system of object of the critical infrastructure
Serhii Honchar, Hennadii Leonenko
262-268
2016-12-31
Сyberwar as a systemic challenge to Ukraine's cybersecurity
Viktor Horlynskyi, Borys Horlynskyi
118-133
2025-05-20
Using EBPF to identify ransomware that use DGA DNS queries
Danyil Zhuravchak, Eduard Kiiko, Valeriy Dudykevych
166-174
2023-12-28
Mathematical model for optimising the contemporary process of training specialists in the field of cybersecurity and information protection
Serhii Horlichenko, Anastasiia Horlichenko
210-218
2024-12-26
Functional model of cybersecurity situation center
Artem Zhylin, Mykola Khudyncev, Maksym Litvinov
51-67
2018-12-30
Directions for strengthening the protection of software processing state electronic information resources and used at critical infrastructure facilities
Olha Shevchuk, Artem Zhylin, Artem Mykytiuk, Anatolii Minochkin
54-67
2024-06-27
Use of large language models to identify fake information
Dmytro Lande, Vira Hyrda
236-242
2024-12-26
Information-telecommunication system, conceptual model of cyberspace and cybersecurity
Ihor Yakoviv
134-144
2017-12-31
Determination of components of route hijack risk by Internet connections topology analysis
Vitalii Zubok
232-239
2020-12-30
Analysis of key factors of formation of the system of competences of professionals in the field of cybersecurity
Viktor Horlynskyi, Borys Horlynskyi
219-231
2021-12-30
Application of large language models for intelligent expansion of semantic networks
Dmytro Lande, Oleksandr Rybak
89-99
2025-05-20
Development detection cyberatacs methods in the critical infrastructure objects information systems overview and prospects
Serhii Serheiev, Andrii Davydiuk, Alla Onyskova
91-99
2021-06-24
Cybersecurity as a component of information security of Ukraine
Viktor Horlynskyi, Borys Horlynskyi
136-148
System for analysing of big data on cybersecurity issues from social media
Dmytro Lande, Oleksandr Puchkov, Ihor Subach
4-18
2020-07-09
Search for high-probability differential characteristics of the lightweight block cipher algorithm present with non-standard substitution blocks
Valerii Zakusilo, Nataliia Kuchynska, Serhii Koniushok
44-53
2024-06-27
Information technology for orchestration of the cybersecurity training situation center cyber range virtual environment
Ivan Horniichuk, Mykhailo Shelelo, Artem Mykytiuk, Volodymyr Onishchenko
283-296
2024-12-26
Filter generators with increased resistance against algebraic attacks
Kateryna Vorobei, Anton Alekseychuk
149-155
2023-12-28
Ontological approach to big data analytics in cybersecurity domain
Anatoly Gladun, Katerina Khala, Ihor Subach
120-132
2020-12-30
Lexical method for solving a multicriteria problem of selecting a SIEM for building a situational center for cybersecurity
Ihor Subach, Volodymyr Kubrak
27-38
2023-06-29
0 - 0 of 28 items
>
>>
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians