Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Theoretical and Applied Cybersecurity
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 5 No. 2 (2023): Theoretical and Applied Cyber Security
Vol. 5 No. 2 (2023): Theoretical and Applied Cyber Security
DOI:
https://doi.org/10.20535/tacs.2664-29132023.2
Published:
2023-11-06
Theoretical and cryptographic problems of cybersecurity
Cryptanalysis of the «Vershyna» digital signature algorithm
Andrii Fesenko, Yuliia Lytvynenko
PDF
On Inverse Protocols of Post Quantum Cryptography Based on Pairs of Noncommutative Multivariate Platforms Used in Tandem
Vasyl Ustymenko
PDF
Mathematical Model of the Process of Raising Integers to an Arbitrary Power of a Natural Number in the System of Residual Classes
Alina Yanko, Dmytro Kovalchuk
PDF
Method of Security Improvement for MST3 Cryptosystem Based on Automorphism Group of Ree Function Field
Yevgen Kotukh, Gennady Khalimov, Maxim Korobchinskiy
PDF
Mathematical methods, models and technologies for secure cyberspace functioning research
Models of Denial of Service Attacks on Cyber-Physical Systems
Mykola Ovcharuk
PDF
Vulnerability classification using Q-analysis
Viktoriia Igorivna Polutsyhanova
PDF
Detection of Unauthorized Actions in Networks Using Wavelet Analysis
Pavlo Hrynchenko
PDF
Complexity of The Systems of Linear Restrictions over a Finite Field
Oleh Kurinnyi
PDF
Intelligent Data analysis methods in cybersecurity
The Development of the Solution Search Method Based on the Improved Bee Colony Algorithm
Andrii Shyshatskyi, Tetiana Stasiuk, Oleh Kuzmenko
PDF
Cybersecurity in AI-Driven Casual Network Formation
Dmytro Lande, Anatolii Feher, Leonard Strashnoy
PDF
Malware detection system based on static and dynamic analysis and using machine learning
Alan Nafiiev, Andrii Rodionov
PDF
Industrial systems and critical infrastructure security
The risk management of critical information infrastructure: threats-vulnerabilities-consequences
Vladyslav Kuz
PDF
The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method
Lesia Alekseichuk, Oleksii Novikov, Andrii Rodionov, Dmytro Yakobchuk
PDF
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems