Abstract is missing.
- ML-trained model and method for blocking dangerous queriesTetiana Korobeinikova, Nazar Kravchuk. 1-16 [doi]
- Model and methodology for the formation of adaptive security profiles for the protection of wireless networks in the face of dynamic cyber threatsPavlo Skladannyi, Yuliya Kostyuk, Karyna Khorolska, Bohdan Bebeshko, Volodymyr Sokolov. 17-36 [doi]
- Architecture of the software system of confidential access to information resources of computer networksYuliya Kostyuk, Svitlana Rzaieva, Karyna Khorolska, Nataliia Mazur, Nataliia Korshun. 37-53 [doi]
- A comparison of programming languages' applicability for encrypted data analysisLeila Rzayeva, Abilkair Imanberdi, Yerassyl Yermekov. 54-63 [doi]
- Modeling of a cryptographic network based on application of CET-operationsVolodymyr Rudnytskyi, Vira Babenko, Nataliia Lada, Tetiana Stabetska, Dmytro Pidlasyi, Liubomyr Parkhuts. 64-79 [doi]
- Intelligent data monitoring anomaly detection system based on statistical and machine learning approachesYurii Klots, Vira Titova, Nataliia Petliak, Dmytro Tymoshchuk, Nataliya Zagorodna. 80-89 [doi]
- A model of a secure information system for cognitive data processing in IoT sensor networks for laboratory climatic testingYaroslav Tarasenko, Oleh Chervotoka, Serhii Orlov, Nataliia Lada, Volodymyr Shapoval, Andrian Piskozub. 90-104 [doi]
- The method for verifying firmware integrity in IoT devices for secure boot using lightweight hash functionsInna Rozlomii, Emil Faure, Andrii Yarmilko, Serhii Naumenko. 105-116 [doi]
- Higher education cyber resilience: Intelligent protection of educational, administrative and resource systemsOlena Kryvoruchko, Yaroslav Shestak, Elizaveta Zavhorodnya, Andriy Fesenko. 117-131 [doi]
- Preparing pre-service teachers for the digital era: Cyberethics, cybersafety, and cybersecurity skills as a core AI competencyOleksandr Termenzhy, Alla Kozhevnikova, Vitalii Susukailo. 132-141 [doi]
- Development of cyberthreat-resistant flood prediction systems using multi-sensor data verificationPetro Venhersky, Orest Onyshchenko, Yaryna Kokovska, Oleksandr Korchenko. 142-152 [doi]
- The methodology for researching the cybersecurity of social platforms in relation to the number of communitiesVolodymyr Akhramovych, Vadym Akhramovych, Anna Ilyenko, Liliia Halata, Tetiana Okhrimenko, Olesia Yakovenko, Yevheniia Halych. 153-166 [doi]
- Intelligent system for hyperspectral image processing based on generative adversarial networksVictor Sineglazov, Oleksii Shcherban. 167-179 [doi]
- Information security and protection from cyber attacks as a component of the economic security system of the enterpriseSergiy Gnatyuk, Zarina Poberezhna, Maksym Zaliskyi. 180-192 [doi]
- A domain-oriented method for evaluating 5G core network software qualityViktor Gnatyuk, Roman Hamretskyi. 193-202 [doi]
- Development of a smart personnel security system using machine learningMaksym Bilychenko, Nataliia Kasianova, Serhii Smerichevskyi, Oleksandr Lavrynenko, Igor Kryvovyazyuk. 203-215 [doi]
- Digital forensics and cyber threat management during wartime: Analysis of new legislative initiativesVasyl Yatskiv, Mykhailo Kasianchuk, Ludmila Babala, Serhii Kulyna. 216-225 [doi]
- Research on automated security incident management in public cloud environmentsOksana Sapsai, Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk. 226-249 [doi]
- Information security risks associated with the uncontrolled storage of secrets in source codeVladyslav Chornii, Yevhenii Martseniuk, Andrii Partyka, Oleh Harasymchuk. 250-271 [doi]
- Security regression visualization in CI/CD using trivy and GitHub actionsYurii Zhuravchak, Danyil Zhuravchak, Anastasiia Zhuravchak, Ivan R. Opirskyy. 272-281 [doi]
- Optimization of virtual machine placement in a university cloud considering information security requirements (short paper)Bakhytzhan Akhmetov, Valerii Lakhno, Nurzhamal Oshanova, Gulistan Yelubay. 282-290 [doi]
- Method of quick hash functions quality determination (short paper)Andrii Sahun, Yevheniy Nikitenko, Pavlo Gikalo, Olena Panasko, Valerii Dudykevych. 291-299 [doi]
- Hybrid method for detecting cyber threats in the network traffic (short paper)Valeriy Lakhno, Sergiy Mamchenko, Alona Desiatko, Bohdan Bebeshko, Ihor Mirko. 300-307 [doi]
- Fuzzy logic system as a component of the web application security information system (short paper)Mikolaj P. Karpinski, leksandr Revniuk, Dmytro Tymoshchuk, Ruslan Kozak, Aizhan Tokkuliyeva. 308-315 [doi]
- CrypticWave: A zero-persistence ephemeral messaging system with client-side encryption (short paper)Maryna Derkach, Danylo Matiuk, Inna Skarga-Bandurova, Nataliya Zagorodna. 316-323 [doi]