Abstract is missing.
- Assessment of Weather Risks for Agriculture using Big Data and Industrial Internet of Things TechnologiesDenis Berestov, Oleg Kurchenko, Lyudmyla Zubyk, Serhii Kulibaba, Nataliia Mazur. 1-13 [doi]
- Model of a Subsystem for Securing E-Mail Against Loss using Mail Transport Agents based on Containerized EnvironmentsBohdan Leshchenko, Tetiana A. Vakaliuk, Andrii Yefimenko, Viacheslav Osadchyi, Dmytro Antoniuk. 14-28 [doi]
- Mobile Application as a Critical Infrastructure Cyberattack SurfaceOlha Mykhaylova, Taras Fedynyshyn, Anastasiia Datsiuk, Bohdan Fihol, Hennadii Hulak. 29-43 [doi]
- A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity ManagementOleksandr Kuznetsov, Emanuele Frontoni, Viktor Katrich, Olena Kobylianska, Svetlana Pshenichnaya. 44-54 [doi]
- Research on Security Challenges in Cloud Environments and Solutions based on the "Security-as-Code" ApproachOleksandr Vakhula, Ivan Opirskyy, Olha Mykhaylova. 55-69 [doi]
- Smart Home Network based on Cisco EquipmentKateryna Kolbasova, Bohdan Zhurakovskyi, Vadym Poltorak, Volodymyr Nakonechnyi, Roman Kyrychok. 70-80 [doi]
- Comparative Analysis of Cryptographic Hash Functions in Blockchain SystemsOleksandr Kuznetsov, Oleksandr Peliukh, Nikolay Poluyanenko, Serhii Bohucharskyi, Ievgeniia Kolovanova. 81-94 [doi]
- Monitoring Ransomware with Berkeley Packet FilterDanyil Zhuravchak, Anastasiia Tolkachova, Andrian Piskozub, Valerii Dudvkevych, Nataliia Korshun. 95-106 [doi]
- Families of Stream Ciphers based on Non-Bijective Multivariate Encryption Maps of High DegreeVasyl Ustimenko, Oleksandr Pustovit. 107-120 [doi]
- Remote Object Confidential Control Technology based on Elliptic CryptographyVadym Poltorak, Bohdan Zhurakovskyi, Volodymyr Saiko, Tamara Loktikova, Olena Nesterova. 121-130 [doi]
- Managing the Security of the Critical Infrastructure Information NetworkSerhii Toliupa, Anatolii Shevchenko, Serhii Buchyk, Ihor Pampukha, Andrii Kulko. 131-142 [doi]
- Development of the Learning Management System Concept based on Blockchain TechnologyVasyl Poberezhnyk, Valeriia Balatska, Ivan Opirskyy. 143-156 [doi]
- Verkle Tree-based Post-Quantum Digital Signature Scheme using Stateless Updatable Vector CommitmentMaksim Iavich, Tamari Kuchukhidze, Tetiana Okhrimenko. 157-166 [doi]
- Studies on WSN Models for IoT-based Monitoring Systems in the Critical Infrastructure of the StateSergiy Gnatyuk, Dauriya Zhaksigulova, Oksana Zhyharevych, Dinara Ospanova, Iryna Chuba. 167-180 [doi]
- Method of Determining the Importance Factor of IT Security Projects Investment Attractiveness in Critical InfrastructuresStanislav Yarotskiy, Viktoriia Sydorenko, Anzhela Lelechenko, Olena Kolisnyk, Artem Polozhentsev. 181-190 [doi]
- Prospects and Applications of Quantum Technologies (short paper)Volodymyr Hrytsyk, Olexii Babii, Mariia Nazarkevych, Vitaliy Chubaievsyi, Volodymyr Astapenya. 191-199 [doi]
- Multifactor Model of the Digital Cryptocurrency Market as a Computational Core of the Information System (short paper)Volodymyr Malyukov, Valery Lakhno, Bohdan Bebeshko, Inna Malyukova, Mereke Zhumadilova. 200-208 [doi]
- Modeling Attacks on the DHCP Protocol in the GNS3 Environment and Determining Methods of Security Against Them (short paper)Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Serhii Smirnov. 209-216 [doi]
- Designing Secured Services for Authentication, Authorization, and Accounting of Users (short paper)Denys Shevchuk, Oleh Harasymchuk, Andrii Partyka, Nataliia Korshun. 217-225 [doi]
- Practical Aspects of Using Fully Homomorphic Encryption Systems to Protect Cloud Computing (short paper)Anna Ilyenko, Sergii Ilyenko, Olena Prokopenko, Hennadii Hulak, Iryna Melnyk. 226-233 [doi]
- Properties of Isogeny Graph of Non-Cyclic Edwards Curves (short paper)Serhii Abramov, Anatoly Bessalov, Volodymyr Sokolov. 234-239 [doi]
- Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper)Pavlo Anakhov, Viktoriia Zhebka, Svitlana Popereshnyak, Pavlo Skladannyi, Volodymyr Sokolov. 240-245 [doi]
- Information Security in Project Management for the Financial and Budgetary Capacity of the National Economy (short paper)Sergii Kavun, Ruslana Levkina, Yana Kotko, Dmytro Levkin, Artur Levkin. 246-254 [doi]
- Methods of Mathematical Programming for Designing a Safe Environment for Bioobject (short paper)Sergii Kavun, Dmytro Levkin, Artur Levkin, Yana Kotko, Ruslana Levkina. 255-260 [doi]
- Experimental Research of the Parameters of Danger and Protective Signals Attached to High-Frequency Imposition (short paper)Larysa Kriuchkova, Ivan Tsmokanych, Svitlana Shevchenko, Oleksandr Bohdanov, Nataliia Mazur. 261-268 [doi]
- Hybrid Study of the Geophysical Situation in the Depressed Zone of Hydroelectric Power Plants Reservoir (short paper)Pavlo Anakhov, Viktoriia Zhebka, Vladislav Kravchenko, Pavlo Skladannyi, Oleksii Zhyltsov. 269-274 [doi]
- Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing (short paper)Nadiia Dovzhenko, Oleg Barabash, Nataliia Ausheva, Yevhen Ivanichenko, Sergiy Obushnyi. 275-280 [doi]
- Robustness of Fingerprint Liveness Detection based on Convolutional Neural Networks (short paper)Yurii Myshkovskyi, Mariia Nazarkevych. 281-288 [doi]
- Families of Square Commutative 2х2 Matrices (short paper)Anatoly Shcherba, Emil Faure, Artem Skutskyi, Oleksandr Kharin. 289-296 [doi]
- Information Security Risk Management using Cognitive Modeling (short paper)Svitlana Shevchenko, Yuliia Zhdanova, Halina Shevchenko, Olena Nehodenko, Svitlana Spasiteleva. 297-305 [doi]
- A Finite Field of Square Matrices of Order 2 (short paper)Emil Faure, Anatoly Shcherba, Artem Skutskyi, Artem Lavdanskyi. 306-312 [doi]
- Secure Encrypted Connection on Georgian Website (short paper)Giorgi Akhalaia, Maksim Iavich, Giorgi Iashvili, Dmytro Prysiazhnyy, Tetiana Smirnova. 313-320 [doi]