About the Journal

Focus and Scope

«Theoretical and Applied Cybersecurity» journal publishes work on the results of recent research on theoretical, scientific, technical, and technological problems related to the creation of methods and means of information protection during its storage, processing, and transmission using modern mathematical methods and information technologies. In particular:

  • Theoretical and cryptographic problems of cybersecurity

  • Mathematical methods, models, and technologies for secure cyberspace functioning research

  • Algorithms and methods of cyber attacks prevention and counteraction

  • Industrial systems and critical infrastructure security

  • Internet of Things cybersecurity

  • Intelligent Data analysis methods in cybersecurity

  • Internet anonymity problems

  • Software code vulnerabilities investigation and secure applications development

  • Social engineering and methods of counteracting destructive effects on consciousness in cyberspace

  • Cybersecurity state compliances

Peer Review Process

  1. All articles undergo three stages of review:

  • for compliance with the requirements of the journal;
  • checking for plagiarism;
  • a double-blind review.
  1. The reviewer may be a member of the editorial board or an authorized expert.

  2. Chief Editor and/or Deputy of chief editor appointed reviewers.

  3. The blind review suggests that neither the author nor the reviewer knows the names of each other, and editors conduct all correspondence between the author and the reviewers.

  4. Results after consideration of articles submitted to the editorial board (report specifically approved by the chief editor of the form).

  5. The reviewer Report is a recommendation, and the editorial board makes the final decision on the publication of articles.

  6. The author can not agree with the opinion of the reviewer and the editor to send a reasoned response.

  7. If necessary, the author sent the comments and terms, which accepted corrections.

  8. In the event of a negative review of the manuscript, the author sent a reasoned review of the refusal.

Publication Frequency

Periodicity: 4 times a year.

Open Access Policy

«Theoretical and Applied Cybersecurity» is an open-access journal. All articles are free for users to access, read, download, and print. By "open access," we mean free availability on the public internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of these articles or use them for any other lawful purpose.

Publication Fee

The journal «Theoretical and Applied Cybersecurity» is free for readers as for authors.

The costs of publishing the paper version of the journal are reimbursed by the Institute of Physics and Technology, National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute."

Publication Ethics

National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" as the publisher of the scientific journal Theoretical And Applied Cybersecurity, recognizes the principles developed by the Committee on Publication Ethics (COPE). The Journal subscribes to the general criteria for publication detailed in Uniform Requirements for Manuscripts Submitted to Biomedical Journals (Vancouver Guidelines) by the International Committee of Medical Journal Editors. And furthermore, the Journal is guided by the Code of Honour of the National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute.”

It is essential that all who participate in producing the journal, who conduct themselves as authors, reviewers, and editors, strictly adhere to the highest level of professional, ethical standards. The journal Theoretical and Applied Cybersecurity expects that editors, authors, and reviewers will observe high standards with respect to publication ethics. We encourage our editors, authors, and reviewers to work in accordance with the Code of Conduct adopted by the COPE.

In issuing the journal, we abide by the relevant laws and regulations for the protection of intellectual property rights and copyrights.

Ethical Responsibilities of Authors

Authors must adhere to high standards with respect to publication ethics and remain in good communication with the editor(s), the publisher, and any co-authors. Authors should refrain from misrepresenting research results which could damage the trust in the journal, the professionalism of scientific authorship, and ultimately the entire scientific endeavor.

By submitting a manuscript to this journal, each author explicitly confirms that the manuscript meets the highest ethical standards of the author and coauthors, including proper statistical investigations and thorough ethical reviews by the data-owning organizations.

We consider unacceptable:

(1) Plagiarism (and self-plagiarism) in whole or in part without proper citation. All the citations should be correct. An author needs to have written permission from the copyright owner for any reproduced figures or tables – exceptions exist under the fair dealing concept. An author must guarantee his submission is original, owned by the author, that no part of it has been previously published (partly or in full), and that no other agreement to publish it or a part of it is outstanding. The manuscript must not be under consideration elsewhere.

Manuscripts submitted to Theoretical and Applied Cybersecurity are screened with UniCheck anti-plagiarism software in an attempt to detect and prevent plagiarism.

(2) Falsification or fabrication of data. No data have been fabricated or manipulated (including images) to support conclusions. Fabrication, falsification, or selective reporting of data with the intent to mislead or deceive is unethical, as is the theft of data or research results from others. If an author uses secondary data (datasets gathered by someone else), he needs to obtain copyright clearance before data can be reproduced (exceptions exist under the fair dealing concept).

(3) Misappropriation of others’ work. All the contributors to an article are to be included, and all acknowledgments should be up-to-date. An author(s) should acknowledge the work of others used in the research and cite publications that have influenced the direction and course of the study.

(4) The deliberate exclusion of information regarding financial support that would be viewed as a conflict of interest. An author should openly disclose any conflict of interest – for example, if the publication were to benefit a company or services in which the author(s) has a vested interest.

All co-authors and responsible authorities should approve the manuscript at the institute or organization where the work has been carried out.

In addition to being accountable for the parts of the work he or she has done, a corresponding author should be able to identify which co-authors are responsible for specific other parts of the work. In addition, authors should have confidence in the integrity of the contributions of their co-authors.

Adding and/or deleting authors at the revision stage may be justifiably warranted. A letter must accompany the revised manuscript to explain the role of the added and/or deleted author(s). Further documentation may be required to support the request.

To ensure objectivity and transparency in research and to ensure that accepted principles of ethical and professional conduct have been followed, authors should include information regarding sources of funding, potential conflicts of interest (financial or non-financial), informed consent if the research involved human participants, and a statement on the welfare of animals if the research involving animals.

For manuscripts reporting studies involving human subjects, statements identifying the committee approving the studies and confirming that informed consent was obtained from all subjects must appear in the Materials and Methods section. All experiments on live vertebrates or higher invertebrates must be performed in accordance with relevant institutional and national guidelines and regulations. Investigations involving humans will have been performed in accordance with the principles of the Declaration of Helsinki. If the manuscript contains photos or parts of photos of patients, informed consent from each patient should be obtained. Patient’s identities and privacy should be carefully protected in the manuscript. The ARRIVE guidelines must be followed when reporting experiments on animals. The journal reserves the right to reject papers where the ethical aspects are, in the Editor's opinion, open to doubt.

When authors discover a serious error in their work, they must report this to the Managing Editor as soon as possible in order to modify the work, withdraw it, retract it, or publish a correction or erratum notice.

Allegations of unethical conduct will be discussed initially with the corresponding author. In the event of a continued dispute, the matter will be referred to the author's institution and funding agencies for investigation and adjudication.

Ethical Responsibilities of Editors

The Editorial Board of Theoretical And Applied Cybersecurity should continuously work to improve the Journal.

Members of the Editorial Board must ensure the confidentiality of all manuscripts received and their content until they have been accepted for publication. Editors must not share information about manuscripts, including whether they have been received and are under review, their content and status in the review process, criticism by reviewers, and their ultimate fate, to anyone other than the authors and reviewers.

In addition, no member of the Editorial Board may use data, lines of reasoning, or interpretations in unpublished manuscripts for his or her own research, except with the authors’ express written consent.

Our Editors should decline to use reviewers who submit reports of poor quality, erroneous or disrespectful, or delivered after the agreed deadline.

Editors should not publish or publicize peer-reviewers comments without the permission of the reviewer and author. Our journal policy is to blind authors to reviewer identity, and comments are not signed. Due to this, identity must not be revealed to the author or anyone else without the reviewers’ expressed written permission.

Confidentiality may have to be breached if dishonesty or fraud is alleged, but editors should notify authors or reviewers if they intend to do so.

Editors should do all they can to ensure the timely processing of manuscripts with the resources available to them. If editors intend to publish a manuscript, they should attempt to do so in a timely manner, and any planned delays should be negotiated with the authors. If a journal has no intention of proceeding with a manuscript, editors should endeavor to reject the manuscript as soon as possible to allow authors to submit it to a different journal.

Editors who make final decisions about manuscripts should recuse themselves from editorial decisions if they have conflicts of interest or relationships that pose potential conflicts related to articles under consideration. Other editorial staff members who participate in editorial decisions must provide editors with a current description of their financial interests or other conflicts (as they might relate to editorial judgments) and recuse themselves from any decisions in which a conflict of interest exists. Editorial staff must not use information gained through working with manuscripts for private gain.

Allegations of unethical conduct will be discussed initially with the Editor. In the event of a continued dispute, the matter will be referred to the Editor’s institution for investigation and adjudication.

Ethical Responsibilities of Reviewers

Manuscripts submitted to the Journal are subject to mandatory peer review. Theoretical And Applied Cybersecurity expect that reviewers will observe high standards with respect to publication ethics. 

Reviewers should only agree to review manuscripts for which they have the subject expertise required to carry out a proper assessment and which they can assess in a timely manner.

Reviewers are expected to respond promptly to requests to review and to submit reviews within the time agreed. Reviewers’ comments should be constructive, honest, and polite.

Reviewers should keep manuscripts, associated material, and the information they contain strictly confidential. Reviewers must not publicly discuss the authors’ work and appropriate authors’ ideas before the manuscript is published. Reviewers must not retain the manuscript for their personal use and should destroy paper copies of manuscripts and delete electronic copies after submitting their reviews.

Reviewers must disclose to editors any conflicts of interest that could bias their opinions of the manuscript and should recuse themselves from reviewing specific manuscripts if the potential for bias exists. Reviewers must not use knowledge of the work they’re reviewing before its publication to further their own interests.

Reviewers should report any breach of publishing ethics they identify directly to the Editorial Office. The following may constitute a breach: plagiarism, self-plagiarism, manipulated images/photos/figures, biased reference list, duplicate publication, data from a previous publication reused without proper referencing, redundant publication, unstated conflicts of interest, or funding, etc.

Allegations of unethical conduct will be discussed initially with the reviewer. In the event of a continued dispute, the matter will be referred to the reviewer’s institution for investigation and adjudication.

Dealing with Allegations of Misconduct

We take all possible misconduct seriously. If an editor has concerns that a submitted article describes something that might be considered to constitute misconduct in research, publication, or professional behavior, we will discuss the case in confidence among our editorial team.

If the case cannot be resolved by discussion with the author(s) and the Editor still has concerns, the case may be reported to the appropriate authorities. If, during the course of reviewing an article, an editor is alerted to possible problems (for example, fraudulent data) in another publication, the editor should immediately alert the Editor-in-Chief here: o.novikov@kpi.ua.

Readers that suspect misconduct in a published article are encouraged to report this to the Editor-in-Chief here: o.novikov@kpi.ua.


  • Dr. Volodymyr Tkach

Journal History




Dr. Prof. Oleksiy Novikov, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine



Dr. Prof. Dmytro Lande, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine



Dr. Prof. Mykhailo Savchuk, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Prof. Anatoliy Kachynsky, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Prof. Yuriy Danyk, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Briggs, Chad Michael, University of Alaska, Anchorage, USA

Dr. Jin Wei-Kocsis, Assistant Professor, Purdue University, Chicago, IL, USA

Dr. Prof. Anton Kudin, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Prof. Olena Homonai, Johannes Gutenberg University Mainz (JGU), Germany

Dr. Prof. Anatolii Bessalov, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Prof. Evgen Machusskiy, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Mikhailo Kolomytsev, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Sergii Smyrnov, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Mykola Grayvoronskiy, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Oleksiy Baranovskiy, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Iryna Styopochkina, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Volodymyr Tkach, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Svitlana Nosok, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine

Dr. Mykola Ilin, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine



Andrii Napreienko, Igor Sikorsky Kyiv Polytechnic Institute, Ukraine