Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Theoretical and Applied Cybersecurity
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 4 No. 1 (2022): Theoretical And Applied Cybersecurity
Vol. 4 No. 1 (2022): Theoretical And Applied Cybersecurity
DOI:
https://doi.org/10.20535/tacs.2664-29132022.1
Published:
2022-12-14
Theoretical and cryptographic problems of cybersecurity
Systems of Linear Restrictions Over a Finite Field
Oleh Kurinnyi
PDF
Destruction of stego images formed by adaptive embedding methods with dictionary learning methods
Dmytro Progonov
PDF
The Modification of the Quantum-Resistant AJPS-1 Cryptographic Primitive
Dariya Yadukha
PDF
On the Security of Qalqan Cipher Against Differential Cryptanalysis
Serhii Yakovliev, Mykhailo Stolovych
PDF
Mathematical methods, models and technologies for secure cyberspace functioning research
Comparison of Tools for Web-Application Brute Forcing
Oleksii Chalyi, Myhailo Kolomytsev
PDF
Formation Networks of Terms for Identifying Semantic Similarity or Difference Degree of Texts in Cybersecurity
Oleh Dmytrenko
PDF
Vulnerability detection in the network traffic flow of the RADIUS protocol based on the object-oriented model
Leonid Galchynsky, Amina Murtazina
PDF
The analysis of cybersecurity subject area terms based on the information diffusion model
Dmytro Lande, Olexiy Novikov, Dmytro Manko
PDF
The inverse problem of Q-analysis of complex systems structure in cyber security
Victoriya Polutsyganova, Serhii Smirnov
PDF
Algorithms and methods of cyber attacks prevention and counteraction
Basic concepts, approaches and fundamentals of cyber threat intelligence
Maryna Makovska, Oleh Kozlenko
PDF
On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode
Vasyl Ustimenko
PDF
Construction of Proactive Monitoring Model using Forecasting Techniques in the SCOM Software Complex
Kateryna Soldatova, Svitlana Nosok
PDF
Intelligent Data analysis methods in cybersecurity
Model of rules for malicious input parameters detection
Oleksandr Korzhenevskyi, Mykola Graivoronskyi
PDF
Social engineering and methods of counteracting destructive effects on consciousness in cyberspace
Compartment model of informational and suggestive influence
Yuliia Nakonechna
PDF
Peculiarities of phishing threats and preventive measures in the conditions of war in Ukraine
Hryhorii Shevchenko, Iryna Stopochkina, Ivan Babenko
PDF
Estimating probable electoral losses using gaming approach in the conditions of information countermeasures
Ivan Tereshchenko, Alina Myronets
PDF
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems