Abstract is missing.
- Computing of Odd Degree Isogenies on Supersingular Twisted Edwards CurvesAnatoly Bessalov, Volodymyr Sokolov, Pavlo Skladannyi, Oleksii Zhyltsov. 1-11 [doi]
- Construction Features and Analysis of Warfare Information Model with Impulse Perturbations under Poisson Approximation Conditions (short paper)Ihor Samoilenko, Anatolii Nikitin, Ganna Verowkina, Tetiana Nikitina. 12-17 [doi]
- New Cryptosystems of Noncommutative Cryptography based on Eulerian Semigroups of Multivariate Transformations (short paper)Vasyl Ustimenko, Oleksandr Pustovit. 18-26 [doi]
- Prospective Areas of Research in the Development of Post-Quantum CryptographyVasyl Sheketa, Svitlana Chupakhina, Mariya Leshchenko, Larysa Tymchuk, Kostiantyn Chub. 27-36 [doi]
- Organizational and Technical Model of National Cybersecurity and Cyber ProtectionRoman Boyarchuk, Mykola Khudyntsev, Oleksiy Lebid, Oleksandr Trofymchuk. 37-46 [doi]
- Game-Theoretic View on Decentralized Proof Generation in zk-SNARK-based SidechainsYuri Bespalov, Alberto Garoffolo, Lyudmila Kovalchuk, Hanna Nelasa, Roman Oliynykov. 47-59 [doi]
- Security Analysis Models for Multimedia Information Resources in Social Networks (short paper)Stanislav Milevskyi, Volodymyr Aleksiyev, Olha Korol, Oleksandr Milov, Serhii Yevseiev. 60-67 [doi]
- Studies on Cloud-based Cyber Incidents Detection and Identification in Critical InfrastructureSergiy Gnatyuk, Rat Berdibayev, Zhadyra Avkurova, Oleksii Verkhovets, Madina Bauyrzhan. 68-80 [doi]
- Network Security Approach based on Traffic Engineering Fast ReRoute with support of Traffic PolicingOleksandr Lemeshko, Oleksandra Yeremenko, Maryna Yevdokymenko, Anastasiia Shapovalova, Valentyn Lemeshko. 81-90 [doi]
- Cybercrimes Investigation via Honeypots in Cloud Environments (short paper)Vitalii Susukailo, Sviatoslav Vasylyshyn, Ivan Opirskyy, Volodymyr Buriachok, Olena Riabchun. 91-96 [doi]
- Method of Diagnostic of Non-Positional Code Structures in the System of Residue Classes Basing on the Usage of an Alternative Number Set InformativenessVictor Krasnobayev, Alexandr Kuznetsov, Anna Kononchenko, Tetiana Kuznetsova. 97-106 [doi]
- Prerequisites for Developing a Methodology for Estimating and Increasing Cryptographic Strength based on Many-Valued Logic FunctionsArtem Sokolov, Nadiia Kazakova, Lydia Kuzmenko, Mariia Mahomedova. 107-116 [doi]
- Improvement of Steganographic Methods based on the Analysis of Image Color Models (short paper)Sergii Buchyk, Sergey Tolyupa, Yaroslav Symonychenko, Anna Symonychenko, Artem Platonenko. 117-124 [doi]
- Application of Arithmetic Coding Methods in Cryptographic Information Protection SystemsDmytro Havrylov, Olexandr Shaigas, Oksana Stetsenko, Yurii Babenko, Valerii Yroshenko. 125-136 [doi]
- Formation of Requirements for the Electronic Record-Book in Guaranteed Information Systems of Distance Learning (short paper)Hennadii Hulak, Larysa Kriuchkova, Pavlo Skladannyi, Ivan Opirskyy. 137-142 [doi]
- Methods for Decoding Informational Codes of Cryptocompression Codograms to Improve Information SecurityVladimir Barannik, Serhii Sidchenko, Natalia Barannik, Dmitriy Barannik, Sergii Shulgin. 143-152 [doi]
- Detection of Attacks in Wireless Networks of IoTOlexander Belej, Nataliia Bokla, Lubov alkiv. 153-163 [doi]
- Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT DevicesRazvan Bocu, Maksim Iavich, Sergiy Gnatyuk, Dinara Ospanova, Yuliia Sotnichenko. 164-174 [doi]
- Biometric Templates Noise Immunity during Transmission by Mobile Networks (short paper)Anna Shcherbak, Andrii Astrakhantsev, Oleg Shcherbak, Galyna Liashenko. 175-181 [doi]
- Aerial Photographs for Ensuring Cyber Security of Critical Infrastructure ObjectsVolodymyr Barannik, Oleksandr Slobodyanyuk, Andrii Krasnorutsky, Anna Korchenko, Serhii Pchelnikov. 182-191 [doi]
- Designing Networked High-Load Distributed Computing Web Systems for Intensive Processing of Information Data FlowsMykola Pasieka, Vasyl Sheketa, Iryna Halushchak, Svitlana Verbeshchuk, Mykhailo Yasinskyi. 192-205 [doi]
- Design of a Residual Adder in Computer Systems (short paper)Victor Krasnobayev, Alexandr Kuznetsov, Victoria Popenko, Tetiana Kuznetsova. 206-212 [doi]
- Use of Neural Networks for Predicting CyberattacksBohdan Bebeshko, Karyna Khorolska, Nataliia Kotenko, Oleksander Kharchenko, Tetyana Zhyrova. 213-223 [doi]
- Method of Determining the Angular Orientation of Small Satellites in OrbitVolodymyr Saiko, Serhii Toliupa, Volodymyr Nakonechnyi, Maxym Kotov, Volodymyr Astapenya. 224-233 [doi]
- Identity Documents Recognition and Detection using Semantic Segmentation with Convolutional Neural Network (short paper)Mykola Kozlenko, Volodymyr Sendetskyi, Oleksiy Simkiv, Nazar Savchenko, Andy Bosyi. 234-242 [doi]
- Method of Detecting Special Points on Biometric Images based on New Filtering Methods (short paper)Mariya Nazarkevych, Volodymyr Hrytsyk, Yaroslav Voznyi, Andrii Marchuk, Olha Vozna. 243-251 [doi]
- Analysis of Automatic Speech Recognition Methods (short paper)Olena Iosifova, Ievgen Iosifov, Volodymyr Sokolov, Oleh Romanovskyi, Igor Sukaylo. 252-257 [doi]
- Harmful Effects of Fake Social Media Accounts and Learning PlatformsNadia Pasieka, Myroslava Kulynych, Svitlana Chupakhina, Yulia Romanyshyn, Mykola Pasieka. 258-271 [doi]
- Recurrent Estimation of the Information State Vector and the Correlation of Measuring Impact Matrix using a Multi-Agent Model (short paper)Zoreslava Brzhevska, Halyna Haidur, Nadiia Dovzhenko, Andrii Anosov, Maksym Vorokhob. 272-276 [doi]
- Methods of the Objects Identification and Recognition Research in the Networks with the IoT Concept Support (short paper)Olha Shevchenko, Andrii Bondarchuk, Olha Polonevych, Bohdan Zhurakovskyi, Nataliia Korshun. 277-282 [doi]
- Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed NetworksDmytro Ageyev, Tamara Radivilova. 283-288 [doi]
- Model of Operation System's Incidents Forecasting (short paper)Valeri Lakhno, Andii Sahun, Vladyslav Khaidurov, Dmitro Kasatkin, Serhii Liubytskyi. 289-294 [doi]
- Management Risks of Dependence on Key Employees: Identification of PersonnelYurii Khlaponin, Olha Izmailov, Nameer Hashim Qasim, Hanna Krasovska, Kateryna Krasovska. 295-308 [doi]
- Information Security Risk Analysis SWOT (short paper)Halyna Shevchenko, Svitlana Shevchenko, Yuliia Zhdanova, Svitlana Spasiteleva, Olena Negodenko. 309-317 [doi]
- Approach of the Attack Analysis to Reduce Omissions in the Risk ManagementSerhii Zybin, Volodymyr Khoroshko, Yuliia Khokhlachova, Valerii Kozachok. 318-328 [doi]
- Analysis of Features and Prospects of Application of Dynamic Iterative Assessment of Information Security Risks (short paper)Denis Berestov, Oleg Kurchenko, Yuri Shcheblanin, Nataliia Korshun, Tetiana Opryshko. 329-335 [doi]