Theoretical and Applied Cybersecurity

«Theoretical and Applied Cybersecurity» journal is the scientific publication of the National Technical University of Ukraine "Igor Sikorsky Kiev Polytechnic Institute". The publication unveils the results of the latest scientific research on the theory and practice of providing cybersecurity and cyberprotection of its objects in cyberspace. The greatest attention is paid to research based on the use of modern mathematical methods and information technologies.

The audience of the journal is the scientists and engineering specialists in the fields of cybernetic and information security, information technologies, adjacent sections of technical, natural and humanitarian sciences. The publication may also be of interest to students, postgraduates, lecturers and experts in these areas. The journal deals with the following areas of research:
  • Theoretical and cryptographic problems of cybersecurity
  • Mathematical methods, models and technologies for secure cyberspace functioning research
  • Algorithms and methods of cyber attacks prevention and counteraction
  • Industrial systems and critical infrastructure security
  • Internet of Things cybersecurity
  • Intelligent Data analysis methods in cybersecurity
  • Internet anonymity problems
  • Software code vulnerabilities investigation and secure applications development
  • Social engineering and methods of counteracting destructive effects on consciousness in cyberspace
  • Cybersecurity state compliances


State Registration Certificate: Series КВ № 23760-13600Р d/d February 14, 2019.

Periodicity: 4 times a year
Language: English, Ukrainian
Establisher: National Technical University of Ukraine "Igor Sikorsky Kiev Polytechnic Institute"
Year of establishment: 2019

Journal circulation comprises 200 copies.

Journal is sent to the reserves of libraries, which list is affirmed by the Order of the Ministry of Education and science of Ukraine№ 1111 d/d October 17, 2012.

Vol 1, No 1 (2019)

Table of Contents

Theoretical and cryptographic problems of cybersecurity

Parameters of the Fastest Cryptographically Strong Twisted Edwards Curves PDF
Anatoly Bessalov, Vladyslav Dykyi, Anton Malyshko, Oksana Tsygankova, Dariya Yadukha
Number of Confirmation Blocks for Bitcoin and GHOST Consensus Protocols on Networks PDF
Ludmila Kovalchuk, Dmytro Kaidalov, Andrii Nastenko, Oleksii Shevtsov, Mariya Rodinko, Roman Oliynykov
On desynchronised multivariate algorithms of El Gamal type for stable semigroups of affine Cremona group PDF
Vasyl Ustimenko
The necessary security requirements for the values used by the AJPS cryptosystem PDF
Andrii Fesenko, Dariya Yadukha
Asymptotic Distributions for S-Box Heterogeneous Differential Probabilities PDF
Serhii Yakovliev, Vsevolod Bakhtigozin

Mathematical methods, models and technologies for secure cyberspace functioning research

Mathematical models of information concealment cases spreading dynamics in social media PDF
Yulia Nakonechna

Algorithms and methods of cyber attacks prevention and counteraction

Fuzzy ontology structure for information leaks and ISC PDF
Oleh Kozlenko

Intelligent Data analysis methods in cybersecurity

National Security Assessment Method Based on Fuzzy Sets Theory PDF
Anatoly Kachynskyi

Software code vulnerabilities investigation and secure applications development

Extended Vulnerability Feature Extraction Based on Public Resources PDF
Yulia Tatarinova, Olga Sinelnikova
Deep learning based automatic software defects detection framework PDF
Artem Chrenousov, Artem Savchenko, Serhii Osadchyi, Yevhen Kubiuk, Yevhen Kostenko, Dmytro Likhomanov

Social engineering and methods of counteracting destructive effects on consciousness in cyberspace

Malicious Information Source Detection in Social Networks PDF
Vadym Melnyk, Iryna Styopochkina
«Reactional» information operations in cyberspace PDF
Volodymyr Mishyn

Cybersecurity state compliances

Methodical and Applied Aspects of Creation and Application of Cyber Ranges PDF
Yuriy Danyk
Comparative Analysis of the Cybersecurity Indices and Their Applications PDF
Valentyna Kravets
OSINT as a part of cyber defense system PDF
Dmytro Lande, Ellina Shnurko-Tabakova