Abstract is missing.
- Implementation of New Families of Graph-based Stream Ciphers with the Hidden Multivariate NatureVasyl Ustimenko, Oleksandr Pustovit. 1-14 [doi]
- Methodology of FPGA Implementation and Performance Evaluation of Polar Coding for 5G CommunicationsJuliy Boiko, Volodymyr Druzhynin, Serhii Buchyk, Ilya Pyatin, Andrii Kulko. 15-24 [doi]
- Automated Conformity Verification Concept for Cloud SecurityYevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Nataliia Korshun. 25-37 [doi]
- Blockchain Application Concept in SSO Technology ContextValeriia Balatska, Vasyl Poberezhnyk, Petro Petriv, Ivan Opirskyy. 38-49 [doi]
- A YOLO-based Method for Object Contour Detection and Recognition in Video SequencesMariia Nazarkevych, Maryna Kostiak, Nazar Oleksiv, Victoria Vysotska, Andrii-Taras Shvahuliak. 49-58 [doi]
- Security as Code Concept for Fulfilling ISO/IEC 27001: 2022 RequirementsOleksandr Vakhula, Yevhenii Kurii, Ivan Opirskyy, Vitalii Susukailo. 59-72 [doi]
- Neural Networks in the Processing of Natural Language Texts in Information Learning SystemsOlha Tkachenko, Kostiantyn Tkachenko, Oleksandr Tkachenko, Roman Kyrychok, Vladyslav Yaskevych. 73-87 [doi]
- Ontological Approach in Modern Educational ProcessesKostiantyn Tkachenko, Olha Tkachenko, Oleksandr Tkachenko, Nataliia Mazur, Iryna V. Mashkina. 88-97 [doi]
- Resistance to Replay Attacks of Remote Control Protocols using the 433 MHz Radio ChannelOlha Mykhaylova, Artem Stefankiv, Taras Nakonechny, Taras Fedynyshyn, Volodymyr Sokolov. 98-110 [doi]
- Three-Pass Protocol on Permutations: Implementation Example and SecurityEmil Faure, Anatoly Shcherba, Artem Lavdanskyi, Mykola Makhynko, Muhabbat Khizirova. 110-124 [doi]
- Processing and Analyzing Images based on a Neural NetworkBohdan Zhurakovskyi, Vadym Poltorak, Serhii Toliupa, Oleksandr Pliushch, Artem Platonenko. 125-136 [doi]
- Information-Driven Permutation Operations for Cryptographic TransformationVira Babenko, Tetiana Myroniuk, Artem Lavdanskyi, Yaroslav Tarasenko, Oleg Myroniuk. 137-149 [doi]
- Method of Remote Biometric Identification of a Person by Voice based on Wavelet Packet TransformOleksandr Lavrynenko, Bohdan Chumachenko, Maksym Zaliskyi, Serhii Chumachenko, Denys Bakhtiiarov. 150-162 [doi]
- Intrusion Detection based on an Intelligent Security System using Machine Learning MethodsSvitlana Popereshnyak, Anastasiya Vecherkovskaya, Viktoriia Zhebka. 163-178 [doi]
- Protection System for Analysis of External Link PlacingIvan Liminovych, Vadym Poltorak, Nadia Kushnir, Bohdan Zhurakovskyi, Sergiy Obushnyi. 179-188 [doi]
- Approaches to Solving Proxy Performance Problems for HTTP and SOCKS5 Protocols for the Case of Multi-Port Passwordless AccessOleksandr Nonik, Nadiia Lobanchykova, Tetiana A. Vakaliuk, Viacheslav Osadchyi, Oleksandr Farrakhov. 189-200 [doi]
- Comprehensive Approach for Developing an Enterprise Cloud InfrastructureVolodymyr Khoma, Aziz Abibulaiev, Andrian Piskozub, Taras Kret. 201-215 [doi]
- Association Rule System for Effective Risk Management of a Cinema ChainAndrii Roskladka, Nataliia Roskladka, Volodymyr Kulazhenko, Alona Desiatko, Alona Shtanova. 216-227 [doi]
- Integrated System for Speaker Diarization and Intruder Detection using Speaker EmbeddingsIllia Zaiets, Vitalii Brydinskyi, Dmytro Sabodashko, Yuriy Khoma, Khrystyna Ruda. 228-238 [doi]
- Person-of-Interest Detection on Mobile Forensics Data - AI-Driven RoadmapOlha Mykhaylova, Taras Fedynyshyn, Volodymyr Sokolov, Roman Kyrychok. 239-251 [doi]
- Method of Ensuring the Functional Stability of the Information System based on Detection of Intrusions and Reconfiguration of Virtual NetworksIryna Zamrii, Viktor Vyshnivskyi, Valentyn Sobchuk. 252-264 [doi]
- Method of Dataset Filling and Recognition of Moving Objects in Video Sequences based on YOLOMariia Nazarkevych, Vasyl Lytvyn, Maryna Kostiak, Nazar Oleksiv, Nazar Nconechnyi. 265-276 [doi]
- Model to Formation Data Base of Internal Parameters for Assessing the Status of the State Secret ProtectionYurii Dreis, Oleksandr Korchenko, Zoreslava Brzhevska, Larysa Kriuchkova, Olena Nesterova. 277-289 [doi]
- Conflict Model of Radio Engineering Systems under the Threat of Electronic WarfareVolodymyr Astapenya, Yuliia Zhdanova, Svitlana Shevchenko, Svitlana Spasiteleva, Olena Kryvoruchko. 290-300 [doi]
- Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of ElementsHryhorii Hnatiienko, Vladyslav Hnatiienko, Ravshanbek Zulunov, Tetiana Babenko, Larysa Myrutenko. 301-311 [doi]
- Method of Binary Detection of Small Unmanned Aerial VehiclesDenys Bakhtiiarov, Bohdan Chumachenko, Oleksandr Lavrynenko, Serhii Chumachenko, Vitalii Kurushkin. 312-321 [doi]
- Methodology for Predicting Failures in a Smart Home based on Machine Learning MethodsViktoriia Zhebka, Pavlo Skladannyi, Serhii Zhebka, Svitlana Shlianchak, Andrii Bondarchuk. 322-332 [doi]
- Conflicting Subsystems in the Information Space: A Study at the Software and Hardware LevelsSvitlana Shevchenko, Yuliia Zhdanova, Volodymyr Astapenya, Olena Nehodenko, Svitlana Spasiteleva. 333-342 [doi]
- Ontological-Relational Data Store Model for a Cloud-based SIEM System DevelopmentViktoriya Sydorenko, Oksana Zhyharevych, Rat Berdybaev, Artem Polozhentsev, Andriy Fesenko. 343-354 [doi]
- Optimization of the Structure of an Information Security Textbook using Genetic Algorithm (short paper)Valerii Lakhno, Yurij Tikhonov, Nazym Sabitova, Lidiya Taimuratova, Mereke Zhumadulova. 355-360 [doi]
- Model of Graphic Object Identification in a Video Surveillance System based on a Neural Network (short paper)Andii Sahun, Vladyslav Khaidurov, Viktor Bobkov. 361-367 [doi]
- Open Source Intelligence for War Crime Documentation (short paper)Vladyslav V. Bilous, Dmytro Bodnenko, Oleksii Khokhlov, Oleksandra V. Lokaziuk, Iryna Stadnik. 368-375 [doi]
- Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy (short paper)Tetiana A. Vakaliuk, Yelyzaveta Trokoz, Oleksandra Pokotylo, Viacheslav Osadchyi, Viktoriia Bolotina. 376-383 [doi]
- Methods of Modeling Database System Security (short paper)Svitlana Rzaieva, Dmytro Rzaiev, Yuliya Kostyuk, Hennadii Hulak, Oleksandr Shcheblanin. 384-390 [doi]
- Detecting Deepfake Modifications of Biometric Images using Neural Networks (short paper)Valeriy Dudykevych, Serhii Yevseiev, Halyna Mykytyn, Khrystyna Ruda, Hennadii Hulak. 391-397 [doi]
- Designing Data Classification and Secure Store Policy According to SOC 2 Type II (short paper)Oleh Deineka, Oleh Harasymchuk, Andrii Partyka, Anatoliy Obshta, Nataliia Korshun. 398-409 [doi]
- Automation of Data Management Processes in Cloud Storage (short paper)Volodymyr Shapoval, Liudmyla Zubyk, Yaroslav Zubyk, Oleg Kurchenko, Valerii Kozachok. 410-418 [doi]
- Influence of Protective Signals on Dangerous Signals of High-Frequency Imposition (short paper)Larysa Kriuchkova, Ivan Tsmokanych, Maksym Vovk, Nataliia Mazur, Oleksandr Bohdanov. 419-425 [doi]
- Analyzing Students' Online Activity to Enhance Education Quality and Boost University Digital Security (short paper)Valerii Lakhno, Nurzhamal Oshanova, Jamilya Akhmetova, Nurgazy Kurbaniyazov, Miroslav Lakhno. 426-431 [doi]
- Method for Calculating the Residual Resource of Fog Node Elements of Distributed Information Systems of Critical Infrastructure Facilities (short paper)Anton Zahynei, Yurii Shcheblanin, Oleg Kurchenko, Andrii Anosov, Vladyslav Kruglyk. 432-439 [doi]
- Neural Networks to Recognize Ships on Satellite Images (short paper)Svitlana Popereshnyak, Anastasiya Vecherkovskaya, Liubov Ivanova. 440-448 [doi]
- Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society (short paper)Valeriy Dudykevych, Galyna Mykytyn, Taras Stosyk, Pavlo Skladannyi. 449-457 [doi]
- Business Activity Indicators for Detecting the Impact of Income Information (short paper)Luka Kadyntsev, Liudmyla Zubyk, Serhii Kulibaba, Anastasiia Ivanytska, Alona Chorna. 458-464 [doi]
- Enhancing Sensor Network Efficiency Through Optimized Flooding Mechanism (short paper)Nadiia Dovzhenko, Oleg Barabash, Andrii Musienko, Yevhen Ivanichenko, Iryna Krasheninnik. 465-470 [doi]
- Application Security Optimization in Container Orchestration Systems Through Strategic Scheduler Decisions (short paper)Yevhenii Voievodin, Inna Rozlomii. 471-478 [doi]
- Dependence of the Algebraic Nonlinearity of 4-Functions of Two Variables from the Cryptographic Properties of Their Component Boolean Functions (short paper)Nadiia Kazakova, Artem Sokolov, Nataliia Balandina. 479-484 [doi]
- Telecommunication Warning of the Crew about the Failure of On-Board Radio Altimeters (short paper)Yurii Hryshchenko, Victor Romanenko, Oleksii Chuzha, Vladyslav Hryshchenko. 485-490 [doi]
- Performing Data Ciphering with the Help of Digital Filters (short paper)Ihor Koriakov, Oleksandr Pliushch, Serhii Toliupa. 491-496 [doi]
- Challenges and Solutions for Cybersecurity and Information Security Management in Organizations (short paper)Vladimer Svanadze, Maksim Iavich, Sergiy Gnatyuk. 497-504 [doi]
- Optimizing Reference Routes through Waypoint Sequence Variation in Emergency Events of Natural and Technological Origin (short paper)Igor Sinitsyn, Yevhen Derevianko, Stanislav Denysyuk, Volodymyr Shevchenko. 505-512 [doi]
- Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography (short paper)Sakhybay Tynymbayev, Sergiy Gnatyuk, Margulan Ibraimov, Timur Namazbayev, Assel Mukasheva. 513-519 [doi]
- Impact of Internet Fragmentation on the Unity, Security, and Stability of Global Internet (short paper)Vladimer Svanadze, Maksim Iavich. 520-525 [doi]