Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Collection "Information Technology and Security"
About
Journal Summary
Focus and Scope
Sections
Publication Frequency
Peer Review Process
Open Access Policy
Privacy Statement
Editorial Team
Editorial board
Current
Archives
Submissions
Announcements
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 12 No. 2 (2024)
Vol. 12 No. 2 (2024)
Published:
2024-12-26
INFORMATION TECHNOLOGY
A model of the space of thematic telegram channels based on contextual links
Oleksandr Puchkov, Dmytro Lande, Ihor Subach
151-161
PDF (Українська)
Expanding the semantic markup of wiki encyclopedias for transformation of protected content into learning objects for individual educational trajectories
Julia Rogushina, Anatoly Gladun, Serhii Pryima, Olena Anishchenko, Artem Mykytiuk
162-183
PDF (Українська)
A universal transaction delegation method for decentralized decision support systems
Vitaliy Tsyganok, Nikita Savchenko, Roman Tsyhanok
184-198
PDF
NETWORK AND APPLICATION SECURITY
Problem formulation and synthesis of statistical algorithms for recognising Web resources and their vulnerabilities by signatures of statistical and fuzzy linguistic features in cyberintelligence complexes
Oleksandr Iliashov, Serhii Sholokhov, Oleksii Khakhliuk, Pavlo Ryzhuk
199-209
PDF
MATHEMATICAL AND COMPUTER MODELING
Mathematical model for optimising the contemporary process of training specialists in the field of cybersecurity and information protection
Serhii Horlichenko, Anastasiia Horlichenko
210-218
PDF
ARTIFICIAL INTELLIGENCE IN THE CYBERSECURITY FIELD
Application directions of artificial intelligence in software development technologies
Volodymyr Sokolov, Viacheslav Riabtsev, Oleksandr Uspenskyi, Danylo Kopych
219-235
PDF (Українська)
Use of large language models to identify fake information
Dmytro Lande, Vira Hyrda
236-242
PDF (Українська)
Innovative methods of automotive crash detection through audio recognition using neural networks algorithms
Dmytro Mogylevych, Roman Khmil
243-256
PDF
CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION
Quantitative assessment of the probability of protective system functioning without unlawful actions
Volodymyr Akhramovych, Vadym Akhramovych
257-267
PDF (Українська)
Educational priorities of training of cyber security specialists under the conditions of the state of martial state in the state
Viktor Horlynskyi, Borys Horlynskyi
268-282
PDF (Українська)
Information technology for orchestration of the cybersecurity training situation center cyber range virtual environment
Ivan Horniichuk, Mykhailo Shelelo, Artem Mykytiuk, Volodymyr Onishchenko
283-296
PDF (Українська)
ELECTRONIC COMMUNICATION SYSTEMS AND NETWORKS
Method of determining the maximum flight range of a UAV using the FPV mode and using the centimeter frequency range of radio-link in laboratory conditions
Oleksandr Salii, Vladyslav Hol
297-312
PDF (Українська)
Model of hierarchical mobile radio network data flow management system
Serhii Salnyk
313-322
PDF (Українська)
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians