Skip to main content
Skip to main navigation menu
Skip to site footer
Modern Information Security
About journal
Current issue
Archive
Editorial board
Information for authors
Contact information
Search
Search
Зареєструватися
Увійти
Current Issue
No 4 (2025)
Content
Title
1-3
PDF (Українська)
Content
4-7
PDF (Українська)
Articles
ANALYSIS OF EXISTING METHODS, MODELS, SYSTEMS AND TOOLS USED TO ASSESS INFORMATION SECURITY IN THE CORPORATE ENVIRONMENT, TAKING INTO ACCOUNT SPECIFIC THREATS
Шульга В. П. (Shulga V.P.), Іванченко Є. В. (Ivanchenko Ye.V.), Берестяна Т. В. (Berestyana T.V.), Роженко А. С. (Rozhenko A.S.)
8-16
PDF (Українська)
PERSONAL DATA PROTECTION IN CYBERSECURITY: INTEGRATION OF RISK MANAGEMENT AND LEGAL MODELS
Ветлицька О. С. (Vetlytska O. S.)
16-23
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY OF CRITICAL INFRASTRUCTURE: APPROACHES, ASSESSMENT OF THE STATE AND DEVELOPMENT PROSPECTS
Гайдур Г. І. (Haidur G.I.), Гахов С. О. (Hakhov S.O.), Скибун О. Ж. (Skybun O. Zh.)
24-37
PDF (Українська)
AUTOMATED METHOD FOR VERIFYING THE CORRECTNESS OF THE EXECUTION OF SMART CONTRACTS IN THE BLOCKCHAIN NETWORK
Hashko A. O. (Гашко А. О.), Bondarchuk A. P. (Бондарчук А.П.)
37-43
PDF
RESEARCH OF THE COMPLEXITY AND PROPERTIES OF DIFFERENT SCANNING SCHEMES OUTPUT DATA OF STEGANOCONTENT, UNDER THE CONDITIONS CHANGING ATTACK SCENARIOS
Гончаров М. О. (Honcharov M. O.), Малахов С. В. (Malakhov S. V.), Жілєнков Д. В. (Zhilienkov D. V.)
44-58
PDF (Українська)
METHODOLOGY FOR DESCRIPTION OF INTERRELATIONSHIPS BETWEEN SETS OF SOFTWARE, DEFECTS, METHODS OF THEIR DETECTION IN THE PROCESS OF DIAGNOSING DAMAGED SOFTWARE
Добришин Ю. Є. (Dobryshyn Yu. Ye.)
58-67
PDF (Українська)
A MODEL FOR DETERMINING QUALITY OF SERVICE (QOS) ROUTING AND ITS DELAY IN WIRELESS NETWORKS
Дрововозов В. І. (Drovovozov V. I.), Аль-Шаммарі А.А.А. (Al-Shammari A.A.A.)
67-73
PDF (Українська)
EVALUATING THE IMPACT OF IMAGE SEMANTICS ON THE EFFECTIVENESS OF STEGANOGRAPHIC METHODS
Журавель Ю. І. (Zhuravel Yu.I.), Мичуда Л. З. (Mychuda L.Z.), Сколоздра М. М. (Skolozdra M.M.)
73-80
PDF (Українська)
RESEARCH INTO THE ARCHITECTURE OF A SOFTWARE-HARDWARE COMPLEX FOR IMPLEMENTING POST-QUANTUM ALGORITHMS IN EMBEDDED SYSTEMS
Удовик І. М. (Udovyk I. M.), Гнатушенко В. В. (Hnatushenko V. V.), Лактіонов І. С. (Laktionov I. S.)
81-89
PDF (Українська)
DEVELOPMENT OF AN AUTHENTICATION METHOD BASED ON A MODIFIED MCELIECE SCHEME FOR DIGITAL RADIO STATIONS WITH POST-QUANTUM STABILITY
Корольов Р. В. (Korolov R. V.), Сокол В. Є. (Sokol V. Ye.), Корченко А. О. (Korchenko A. O.)
90-96
PDF (Українська)
INTEGRATED APPROACH TO THE ANALYSIS OF INVESTMENTS IN DIGITAL INFRASTRUCTURE BASED ON CLUSTERING AND REGRESSION MODELS
Криворучко В. Ф. (Kryvoruchko V. F.), Садовенко В. С. (Sadovenko V. S.)
96-102
PDF (Українська)
ANALYSIS OF THE PROCESS OF RECONFIGURATION OF REGULATORY AND LEGAL SUPPORT FOR INFORMATION SECURITY IN UKRAINE
Нужний C. М. (Nuzhny S.M.), Костяк М. Ю. (Kostyak M. Yu.), Пархуць Л. Т. (Parkhuts L.T.)
103-115
PDF (Українська)
USER AUTHENTICATION IN INFORMATION SYSTEMS BASED ON BIOMETRIC SIGNALS OF MOBILE DEVICES
Лісовський Б. В. (Lisovsky B. V.), Журавель І. М. (Zhuravel I. M.)
116-123
PDF (Українська)
USING ARTIFICIAL INTELLIGENCE METHODS TO DETECT ZERO-DAY VULNERABILITIES
Максимович М. В. (Maksymovych M. V.)
123-132
PDF (Українська)
REVIEW OF MODERN APPROACHES TO SECURE DOCKER COMPOSE CONFIGURATION
Мичуда Л. З. (Mychuda L. Z.), Расяк В. І. (Rasyak V. I.)
132-140
PDF (Українська)
METHODS FOR DETECTING MALICIOUS PROPERTIES OF ALTERNATIVE ROUTER FIRMWARE IN THE CONTEXT OF MODERN NETWORK THREATS
Прокопович-Ткаченко Д. І. (Prokopovych-Tkachenko D. I.), Зубченко Н. С. (Zubchenko N. S.), Черкаський О. В. (Cherkasky O. V.), Черкаський Д. О. (Cherkasky D. O.), Тихоненко І. М. (Tykhonenko I. M.)
140-154
PDF (Українська)
DEVELOPMENT OF AUTHENTICATION METHODS BASED ON MODIFIED CODE THEORETICAL SCHEMES
Стеценко В. О. (Stetsenko V. O.)
155-164
PDF (Українська)
METHODS FOR ASSESSING THE QUALITY AND CRYPTOGRAPHIC STRENGTH OF SEQUENCES GENERATED BY PSEUDORANDOM NUMBER GENERATORS
Цебак О. А. (Tsebak O. A.), Войтусік С. С. (Voytusik S. S.)
164-171
PDF (Українська)
TARASENKO O.V. ANALYTICAL ASSESSMENT OF TRENDS AND FEATURES OF THE EVOLUTION OF UNMANNED AERIAL VEHICLES IN THE RUSSIAN-UKRAINIAN WAR
Шиповський В. В. (Shypovsky V. V.), Тарасенко О. В. (Tarasenko O. V.)
171-180
PDF (Українська)
View All Issues
Open Journal Systems
Language
English
Українська