Technology, models and methods of information security or cybersecurity

 

Technology, models and methods of information security or cybersecurity

 

Issue number:

pdf

View the article:

Authors:

Vol. 7 № 3 2024

284–295

An expert system of recommendations for combating cyber threats using CVSS metrics and game theory

  • Maksym V. Mishchenko
  • Mariia S. Dorosh

Vol. 7 № 2 2024

158–170

Cyber-aware threats and management strategies in cloud environments

  • Vira V. Liubchenko
  • Denys V. Volkov

Vol. 6 № 4 2023

338–351

Software implementation of the data encryption module on the BeagleBone platform for data transmission systems with increased cryptoresistance

  • Maksym M. Seniv
  • Sviatoslav I. Rovenchak
  • Vitaliy S. Yakovyna

Vol. 5 № 4 2022

297–308

Functional modeling of the organization’s information security culture state monitoring system development

  • Mariia M. Voitsekhovska
  • Mariia S. Dorosh
  • Viktor F. Grechaninov
  • Olena V. Verenych

Vol. 4 № 3 2021

244-254

Detection and classification of network attacks using the deep neural network cascade

  • Irina M. Shpinareva
  • Anastasia A. Yakushina
  • Lyudmila A.Voloshchuk
  • Nikolay M. Rudnichenko

Vol. 4 № 2 2021

155–167

Models and methods for diagnosing zero-day threats in cyberspace

  • Oleksandr S. Saprykin