Abstract is missing.
- Model to formation data base of secondary parameters for assessing status of the state secret protectionYurii Dreis, Oleksandr Korchenko, Volodymyr Sokolov, Pavlo Skladannyi. 1-11 [doi]
- Research on the effectiveness of concatenated embeddings in facial verificationDenys Khanin, Viktor Otenko, Volodymyr Khoma. 12-21 [doi]
- Shadow IT risk analysis in public cloud infrastructureYevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk, Elena Nyemkova, Mikolaj P. Karpinski. 22-31 [doi]
- Increase the cybersecurity of SCADA and IIoT devices with secure memory managementAndrii Nyzhnyk, Andrii Partyka, Michal Podpora. 32-41 [doi]
- Predicting pseudo-random number generator output with sequential analysisDmytro Proskurin, Maksim Iavich, Tetiana Okhrimenko, Okoro Chukwukaelonma, Tetiana Hryniuk. 42-57 [doi]
- Research on security as code approach for cloud-native applications based on Kubernetes clusterOleksandr Vakhula, Ivan Opirskyy. 58-69 [doi]
- Utilizing blockchain technologies for ensuring the confidentiality and security of personal data in compliance with GDPRValeriia Balatska, Vasyl Poberezhnyk, Ivan Opirskyy. 70-80 [doi]
- Experimental study of the model for calculating the quantitative criteria for assessing the security level of information and communication systems of the state critical infrastructure (short paper)Sergiy Gnatyuk, Viktoriia Sydorenko, Oleksiy Yudin, Andrii Paziuk, Artem Polozhentsev. 81-89 [doi]
- Designing an effective network-based intrusion-detecting system for 5G networks (short paper)Azamat Imanbayev, Ansar Jakupov, Yersultan Valikhan, Roman Odarchenko. 90-96 [doi]
- Methodology of network infrastructure analysis as part of migration to zero-trust architecture (short paper)Roman Syrotynskyi, Ivan Tyshyk, Orest Kochan, Volodymyr Sokolov, Pavlo Skladannyi. 97-105 [doi]
- Analysis of modern LMS platforms in Kazakhstan: Structure, functionality, cybersecurity (short paper)Berik Akhmetov, Sergiy Gnatyuk, Bakhytzhan Akhmetov, Bauyrzhan Tynymbayev. 106-113 [doi]
- The practice of block symmetric encryption for a secure Internet connection (short paper)Tetiana Korobeinikova, Ihor Zhuravel, Lesya Mychuda, Axel Sikora. 114-122 [doi]
- Signature-based manual dating vs. neural network automation (short paper)Tea Tvalavadze, Ia Ghadua, Giorgi Kalandadze, Maksim Iavich. 123-130 [doi]