Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Modern Information Security
About journal
About journal
Journal indexing
Current issue
Archive
Journal Policy
Editorial board
Information for authors
Search
Зареєструватися
Увійти
Home
/
Archives
/
No. 4 (2025)
No. 4 (2025)
Published:
2025-12-25
Content
Title
1-3
PDF (Українська)
Content
4-7
PDF (Українська)
Articles
ANALYSIS OF EXISTING METHODS, MODELS, SYSTEMS AND TOOLS USED TO ASSESS INFORMATION SECURITY IN THE CORPORATE ENVIRONMENT, TAKING INTO ACCOUNT SPECIFIC THREATS
DOI: 10.31673/2409-7292.2025.041201
В. П. Шульга, (Shulga V.P.), Є. В. Іванченко, (Ivanchenko Ye.V.), Т. В. Берестяна, (Berestyana T.V.), А. С. Роженко, (Rozhenko A.S.)
8-16
PDF (Українська)
PERSONAL DATA PROTECTION IN CYBERSECURITY: INTEGRATION OF RISK MANAGEMENT AND LEGAL MODELS
DOI: 10.31673/2409-7292.2025.041202
О. С. Ветлицька, (Vetlytska O. S.)
16-23
PDF (Українська)
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY OF CRITICAL INFRASTRUCTURE: APPROACHES, ASSESSMENT OF THE STATE AND DEVELOPMENT PROSPECTS
DOI: 10.31673/2409-7292.2025.041203
Г. І. Гайдур, (Haidur G.I.), С. О. Гахов, (Hakhov S.O.), О. Ж. Скибун, (Skybun O. Zh.)
24-37
PDF (Українська)
AUTOMATED METHOD FOR VERIFYING THE CORRECTNESS OF THE EXECUTION OF SMART CONTRACTS IN THE BLOCKCHAIN NETWORK
DOI: 10.31673/2409-7292.2025.041204
A. O. Hashko, (Гашко А. О.), A. P. Bondarchuk, (Бондарчук А.П.)
37-43
PDF
RESEARCH OF THE COMPLEXITY AND PROPERTIES OF DIFFERENT SCANNING SCHEMES OUTPUT DATA OF STEGANOCONTENT, UNDER THE CONDITIONS CHANGING ATTACK SCENARIOS
DOI: 10.31673/2409-7292.2025.041205
М. О. Гончаров, (Honcharov M. O.), С. В. Малахов, (Malakhov S. V.), Д. В. Жілєнков, (Zhilienkov D. V.)
44-58
PDF (Українська)
METHODOLOGY FOR DESCRIPTION OF INTERRELATIONSHIPS BETWEEN SETS OF SOFTWARE, DEFECTS, METHODS OF THEIR DETECTION IN THE PROCESS OF DIAGNOSING DAMAGED SOFTWARE
DOI: 10.31673/2409-7292.2025.041206
Ю. Є. Добришин, (Dobryshyn Yu. Ye.)
58-67
PDF (Українська)
A MODEL FOR DETERMINING QUALITY OF SERVICE (QOS) ROUTING AND ITS DELAY IN WIRELESS NETWORKS
DOI: 10.31673/2409-7292.2025.041207
В. І. Дрововозов, (Drovovozov V. I.), А.А.А. Аль-Шаммарі, (Al-Shammari A.A.A.)
67-73
PDF (Українська)
EVALUATING THE IMPACT OF IMAGE SEMANTICS ON THE EFFECTIVENESS OF STEGANOGRAPHIC METHODS
DOI: 10.31673/2409-7292.2025.041208
Ю. І. Журавель, (Zhuravel Yu.I.), Л. З. Мичуда, (Mychuda L.Z.), М. М. Сколоздра, (Skolozdra M.M.)
73-80
PDF (Українська)
RESEARCH INTO THE ARCHITECTURE OF A SOFTWARE-HARDWARE COMPLEX FOR IMPLEMENTING POST-QUANTUM ALGORITHMS IN EMBEDDED SYSTEMS
DOI: 10.31673/2409-7292.2025.041217
І. М. Удовик, (Udovyk I. M.), В. В. Гнатушенко, (Hnatushenko V. V.), І. С. Лактіонов, (Laktionov I. S.)
81-89
PDF (Українська)
DEVELOPMENT OF AN AUTHENTICATION METHOD BASED ON A MODIFIED MCELIECE SCHEME FOR DIGITAL RADIO STATIONS WITH POST-QUANTUM STABILITY
DOI: 10.31673/2409-7292.2025.041209
Р. В. Корольов, (Korolov R. V.), В. Є. Сокол, (Sokol V. Ye.), А. О. Корченко, (Korchenko A. O.)
90-96
PDF (Українська)
INTEGRATED APPROACH TO THE ANALYSIS OF INVESTMENTS IN DIGITAL INFRASTRUCTURE BASED ON CLUSTERING AND REGRESSION MODELS
DOI: 10.31673/2409-7292.2025.041210
В. Ф. Криворучко, (Kryvoruchko V. F.), В. С. Садовенко, (Sadovenko V. S.)
96-102
PDF (Українська)
ANALYSIS OF THE PROCESS OF RECONFIGURATION OF REGULATORY AND LEGAL SUPPORT FOR INFORMATION SECURITY IN UKRAINE
DOI: 10.31673/2409-7292.2025.041214
C. М. Нужний, (Nuzhny S.M.), М. Ю. Костяк, (Kostyak M. Yu.), Л. Т. Пархуць, (Parkhuts L.T.)
103-115
PDF (Українська)
USER AUTHENTICATION IN INFORMATION SYSTEMS BASED ON BIOMETRIC SIGNALS OF MOBILE DEVICES
DOI: 10.31673/2409-7292.2025.041211
Б. В. Лісовський, (Lisovsky B. V.), І. М. Журавель, (Zhuravel I. M.)
116-123
PDF (Українська)
USING ARTIFICIAL INTELLIGENCE METHODS TO DETECT ZERO-DAY VULNERABILITIES
DOI: 10.31673/2409-7292.2025.041212
М. В. Максимович, (Maksymovych M. V.)
123-132
PDF (Українська)
REVIEW OF MODERN APPROACHES TO SECURE DOCKER COMPOSE CONFIGURATION
DOI: 10.31673/2409-7292.2025.041213
Л. З. Мичуда, (Mychuda L. Z.), В. І. Расяк, (Rasyak V. I.)
132-140
PDF (Українська)
METHODS FOR DETECTING MALICIOUS PROPERTIES OF ALTERNATIVE ROUTER FIRMWARE IN THE CONTEXT OF MODERN NETWORK THREATS
DOI: 10.31673/2409-7292.2025.041215
Д. І. Прокопович-Ткаченко, (Prokopovych-Tkachenko D. I.), Н. С. Зубченко, (Zubchenko N. S.), О. В. Черкаський, (Cherkasky O. V.), Д. О. Черкаський, (Cherkasky D. O.), І. М. Тихоненко, (Tykhonenko I. M.)
140-154
PDF (Українська)
DEVELOPMENT OF AUTHENTICATION METHODS BASED ON MODIFIED CODE THEORETICAL SCHEMES
DOI: 10.31673/2409-7292.2025.041216
В. О. Стеценко, (Stetsenko V. O.)
155-164
PDF (Українська)
METHODS FOR ASSESSING THE QUALITY AND CRYPTOGRAPHIC STRENGTH OF SEQUENCES GENERATED BY PSEUDORANDOM NUMBER GENERATORS
DOI: 10.31673/2409-7292.2025.041218
О. А. Цебак, (Tsebak O. A.), С. С. Войтусік, (Voytusik S. S.)
164-171
PDF (Українська)
TARASENKO O.V. ANALYTICAL ASSESSMENT OF TRENDS AND FEATURES OF THE EVOLUTION OF UNMANNED AERIAL VEHICLES IN THE RUSSIAN-UKRAINIAN WAR
DOI: 10.31673/2409-7292.2025.041219
В. В. Шиповський, (Shypovsky V. V.), О. В. Тарасенко, (Tarasenko O. V.)
171-180
PDF (Українська)
Developed By
Open Journal Systems
Language
English
Українська