Technologies, models and methods of information security and cybersecurity
Technologies, models and methods of information security and cybersecurity
Issue number:
|
pdf
|
View the article:
|
Authors:
|
Vol. 7 № 3 2024
284–295
|
 |
An expert system of recommendations for combating cyber threats using CVSS metrics and game theory
|
- Maksym V. Mishchenko
- Mariia S. Dorosh
|
Vol. 7 № 2 2024
158–170
|
 |
Cyber-aware threats and management strategies in cloud environments
|
- Vira V. Liubchenko
- Denys V. Volkov
|
Vol. 6 № 4 2023
338–351
|
 |
Software implementation of the data encryption module on the BeagleBone platform for data transmission systems with increased cryptoresistance
|
- Maksym M. Seniv
- Sviatoslav I. Rovenchak
- Vitaliy S. Yakovyna
|
Vol. 5 № 4 2022
297–308
|
 |
Functional modeling of the organization’s information security culture state monitoring system development
|
- Mariia M. Voitsekhovska
- Mariia S. Dorosh
- Viktor F. Grechaninov
- Olena V. Verenych
|
Vol. 4 № 3 2021
244-254
|
 |
Detection and classification of network attacks using the deep neural network cascade
|
- Irina M. Shpinareva
- Anastasia A. Yakushina
- Lyudmila A.Voloshchuk
- Nikolay M. Rudnichenko
|
Vol. 4 № 2 2021
155–167
|
 |
Models and methods for diagnosing zero-day threats in cyberspace
|
|