Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Theoretical and Applied Cybersecurity
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 2 No. 1 (2020)
Vol. 2 No. 1 (2020)
DOI:
https://doi.org/10.20535/tacs.2664-29132020.1
Published:
2020-08-06
Theoretical and cryptographic problems of cybersecurity
Aspects of blockchain reliability considering its consensus algorithms
K.S. Gorniak, A.M. Kudin
PDF
Mathematical methods, models and technologies for secure cyberspace functioning research
Algebraic immunity of vectorial boolean functions and boolean groebner bases
A.N. Alekseychuk
PDF
Reinforced machine learning methods for testing quality of cyber threat prediction results
A.B. Kachynskyi, N.A. Tsebrinska
PDF
Comparison of Efficiency of Statistical Models Used for Formation of Feature Vectors by JPEG Images Steganalysis
Nataliya Koshkina
PDF
Malicious and benign websites classification using machine learning methods
M. Lavreniuk, O. Novikov
PDF
On the usage of postquantum protocols defined in terms of transformation semi- groups and their homomophisms
V. Ustimenko
PDF
Algorithms and methods of cyber attacks prevention and counteraction
Mobile driving license system deployment model with security enhancement
V. Blynkov, V. Yaremenko
PDF
Detection and correction of database schema integrity violation based on initialization scripts
O. Kondratiuk, M. Kolomitsev
PDF
DeeDP: vulnerability detection and patching based on deep learning
A. Savchenko, O. Fokin, A. Chernousov, O. Sinelnikova, S. Osadchyi
PDF
Internet of Things cybersecurity
Machine learning based network traffic classification approach for Internet of Things devices
V. Melnyk, P. Haleta, N. Golphamid
PDF
Intelligent Data analysis methods in cybersecurity
Methods and Techniques of Assessment of the Value Orientations of Social Media Users
K. Kiforchuk
PDF
Social engineering and methods of counteracting destructive effects on consciousness in cyberspace
Wavelet and fractal analysis based news spreading model
B. Smetanyuk, V. Mishyn, Y. Nakonechna
PDF
Cybersecurity state compliances
Features of Ensuring Cybersecurity of the Critical Infrastructure of the State
Y. Danyk, Ch. Briggs, T. Maliarchuk
PDF
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems