Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Theoretical and Applied Cybersecurity
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 1 No. 1 (2019)
Vol. 1 No. 1 (2019)
DOI:
https://doi.org/10.20535/tacs.2664-29132019.1
Published:
2019-05-29
Theoretical and cryptographic problems of cybersecurity
Parameters of the Fastest Cryptographically Strong Twisted Edwards Curves
Anatoly Bessalov, Vladyslav Dykyi, Anton Malyshko, Oksana Tsygankova, Dariya Yadukha
PDF
Number of Confirmation Blocks for Bitcoin and GHOST Consensus Protocols on Networks
Ludmila Kovalchuk, Dmytro Kaidalov, Andrii Nastenko, Oleksii Shevtsov, Mariya Rodinko, Roman Oliynykov
PDF
On desynchronised multivariate algorithms of El Gamal type for stable semigroups of affine Cremona group
Vasyl Ustimenko
PDF
The necessary security requirements for the values used by the AJPS cryptosystem
Andrii Fesenko, Dariya Yadukha
PDF
Asymptotic Distributions for S-Box Heterogeneous Differential Probabilities
Serhii Yakovliev, Vsevolod Bakhtigozin
PDF
Mathematical methods, models and technologies for secure cyberspace functioning research
Mathematical models of information concealment cases spreading dynamics in social media
Yulia Nakonechna
PDF
Algorithms and methods of cyber attacks prevention and counteraction
Fuzzy ontology structure for information leaks and ISC
Oleh Kozlenko
PDF
Intelligent Data analysis methods in cybersecurity
National Security Assessment Method Based on Fuzzy Sets Theory
Anatoly Kachynskyi
PDF
Software code vulnerabilities investigation and secure applications development
Extended Vulnerability Feature Extraction Based on Public Resources
Yulia Tatarinova, Olga Sinelnikova
PDF
Deep learning based automatic software defects detection framework
Artem Chrenousov, Artem Savchenko, Serhii Osadchyi, Yevhen Kubiuk, Yevhen Kostenko, Dmytro Likhomanov
PDF
Social engineering and methods of counteracting destructive effects on consciousness in cyberspace
Malicious Information Source Detection in Social Networks
Vadym Melnyk, Iryna Styopochkina
PDF
«Reactional» information operations in cyberspace
Volodymyr Mishyn
PDF
Cybersecurity state compliances
Methodical and Applied Aspects of Creation and Application of Cyber Ranges
Yuriy Danyk
PDF
Comparative Analysis of the Cybersecurity Indices and Their Applications
Valentyna Kravets
PDF
OSINT as a part of cyber defense system
Dmytro Lande, Ellina Shnurko-Tabakova
PDF
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems