Vol 2, No 1 (2020)

DOI: https://doi.org/10.20535/tacs.2664-29132020.1

Table of Contents

Theoretical and cryptographic problems of cybersecurity

Aspects of blockchain reliability considering its consensus algorithms PDF
K.S. Gorniak, A.M. Kudin

Mathematical methods, models and technologies for secure cyberspace functioning research

Algebraic immunity of vectorial boolean functions and boolean groebner bases PDF
A.N. Alekseychuk
Reinforced machine learning methods for testing quality of cyber threat prediction results PDF
A.B. Kachynskyi, N.A. Tsebrinska
Comparison of Efficiency of Statistical Models Used for Formation of Feature Vectors by JPEG Images Steganalysis PDF
Nataliya Koshkina
Malicious and benign websites classification using machine learning methods PDF
M. Lavreniuk, O. Novikov
On the usage of postquantum protocols defined in terms of transformation semi- groups and their homomophisms PDF
V. Ustimenko

Algorithms and methods of cyber attacks prevention and counteraction

Mobile driving license system deployment model with security enhancement PDF
V. Blynkov, V. Yaremenko
Detection and correction of database schema integrity violation based on initialization scripts PDF
O. Kondratiuk, M. Kolomitsev
DeeDP: vulnerability detection and patching based on deep learning PDF
A. Savchenko, O. Fokin, A. Chernousov, O. Sinelnikova, S. Osadchyi

Internet of Things cybersecurity

Machine learning based network traffic classification approach for Internet of Things devices PDF
V. Melnyk, P. Haleta, N. Golphamid

Intelligent Data analysis methods in cybersecurity

Methods and Techniques of Assessment of the Value Orientations of Social Media Users PDF
K. Kiforchuk

Social engineering and methods of counteracting destructive effects on consciousness in cyberspace

Wavelet and fractal analysis based news spreading model PDF
B. Smetanyuk, V. Mishyn, Y. Nakonechna

Cybersecurity state compliances

Features of Ensuring Cybersecurity of the Critical Infrastructure of the State PDF
Y. Danyk, Ch. Briggs, T. Maliarchuk