Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Theoretical and Applied Cybersecurity
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 7 No. 2 (2025): Theoretical and Applied Cybersecurity
Vol. 7 No. 2 (2025): Theoretical and Applied Cybersecurity
DOI:
https://doi.org/10.20535/tacs.2664-29132025.2
Published:
2025-11-17
Theoretical and cryptographic problems of cybersecurity
Bit-sliced Algorithm for the 512-point Number Theoretic Transform
Illia Kripaka, Andrii Fesenko
PDF
Method of Security Evaluation of the LBlock-like Ciphers against Differential Cryptanalysis
Oleksii Yakymchuk, Mykhailo Lopatetskyi
PDF
Information Security Challenges in an Enterprise-Grade Software Development Lifecycle
Kamil Mahomedov
PDF
Some Properties of RX-Differential Probabilities for an Operation that Approximates Modular Addition
Nikita Korzh
PDF
Mathematical methods, models and technologies for secure cyberspace functioning research
Determination of Cyberattack Parameters on the Measurements System of Critical Infrastructure Facility
Iryna Stopochkina, Oleksii Novikov, Mykola Ilin, Mykola Ovcharuk, Andrii Voitsekhovskyi
PDF
Recovering S-boxes from the Differential Distribution Table and Affine Equivalence Classes of S-boxes with Respect to Modular Addition
Stepan Yershov, Serhii Yakovliev
PDF
Algorithms and methods of cyber attacks prevention and counteraction
Detecting the operation of keyloggers using the dendritic cell algorithm with multiple resolutions
Hennadii Shybaiev, Leonid Galchynskyi
PDF
Intelligent Data analysis methods in cybersecurity
An Iterative Algorithm for Interdependent Estimation of Node and Link Weights in Corporate Networks for Cyber Risk Analysis
Lesia Alekseichuk, Dmytro Lande
PDF
Cybersecurity of Intellectual Information Aggregation Processes into Digital Archives
Yuriy Tsyrulnev
PDF
Automating Cybersecurity Decision‑Making with AI and the Analytic Hierarchy Process
Igor Svoboda
PDF
A Formal Model for Constructing Sensitive Data Graphs from Cyber Reports using Large Language Models
Viktor Turskyi
PDF
Information
For Readers
For Authors
For Librarians
Developed By
Open Journal Systems