Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Information Technology: Computer Science, Software Engineering and Cyber Security
Homepage
Current
About the Journal
Purpose and tasks
Editorial policy
Ethical norms
Editorial Board
Archives
For authors
Publication conditions
Article selection criteria
Requirements for execution
Peer-review process
Contacts
Search
Register
Login
Home
/
Archives
/
No. 4 (2024): Information Technology: Computer Science, Software Engineering and Cyber Security
No. 4 (2024): Information Technology: Computer Science, Software Engineering and Cyber Security
DOI:
https://doi.org/10.32782/IT/2024-4
Published:
2024-12-30
Full Issue
Завантажити номер одним файлом (Українська)
Статті
МATHEMATICAL MODELING OF THE VULNERABILITY OF THE INFORMATION SYSTEM AND FORECASTING OF ITS PROTECTION POSSIBILITIES
Valentyna ABLAMSKA, Natalia DIACHENKO, Valentyn HALUNKO
3-8
PDF (Українська)
PLAGIARISM DETECTION IN TEXTS GENERATED BY LARGE LANGUAGE MODELS
Kateryna ANTIPOVA, Ihor KANDYBA, Svitlana BOROVLOVA, Viktor RALENKO
9-15
PDF (Українська)
THE USE OF MACHINE LEARNING METHODS FOR ADAPTING SOFTWARE TO DIFFERENT COMPUTING PLATFORMS
Mykhailo BERDNYK, Igor STARODUBSKYI
16-28
PDF (Українська)
SECURE DATA PROCESSING IN BUSINESS-INTERNET PLATFORMS AND E-COMMERCE SYSTEMS
Volodymyr BOHOMYA, Liubov CHEREMISINA, Andrii YARMOLATII
29-34
PDF (Українська)
LEGAL REGULATION OF CYBERSECURITY IN THE CONTEXT OF CRITICAL INFRASTRUCTURE PROTECTION
Volodymyr BOHOMIA, Valentyn HALUNKO
35-42
PDF (Українська)
SECURE PROGRAMMING: AUTOMATED TOOLS FOR DETECTING VULNERABILITIES IN CODE
Andrii BORYSENKO
43-52
PDF (Українська)
DEVELOPMENT OF SOFTWARE FOR COLLECTION OF PHENOTYPIC DATA OF SUNFLOWER SEEDS
Stanyslav VEDMEDEV
53-60
PDF (Українська)
LMS PREDICTION AND KALMAN FILTERING FOR THE PROBABILITY OF THE MAIZE DISEASE OCCURENCE
Vyacheslav GOREV, Yana SHEDLOVSKA, Ivan LAKTIONOV, Grygorii DIACHENKO
61-67
PDF
IMPORTANT ISSUES OF DATA PROCESSING AND PROTECTION IN DISTRIBUTED SYSTEMS
Serhii DOROZHYNSKYI, Vitaliy TUPKALO, Yuriy SHCHERBYNA
68-74
PDF
CONSIDERING RISKS WHEN USING INFORMATION TECHNOLOGY
Valentyn DIACHENKO, Natalia DIACHENKO
75-80
PDF (Українська)
USING MACHINE LEARNING FOR CLUSTERINGUSING THE HAZARD INDEX OF TAILINGSAND THEIR ENVIRONMENTAL IMPACT
Timur ZHELDAK, Alexander VLADYKO
81-91
PDF (Українська)
ENGLISH BORROWINGS IN THE CYBERSECURITY SECTOR ON THE CURRENT STAGE OF THE UKRAINIAN LANGUAGE DEVELOPMENT
Uliana ZHORNOKUI, Nataliia KOVALENKO
92-98
PDF (Українська)
GEOINFORMATION TECHNOLOGY FOR DETECTING AND MODELING FLOODED AREAS OF DUBAI BASED ON CONVOLUTIONAL NEURAL NETWORK
Denys IVANOV, Vita KASHTAN
99-113
PDF (Українська)
CHARACTERISTIC PROPERTIES OF CENTRALIZATION IN THE ARCHITECTURE OF MULTI -COMPUTER SYSTEMS OF ANTIVIRAL COMBINED BAITS AND TRAPS
Antonina KASHTALIAN
114-124
PDF (Українська)
THEORETICAL AND METHODOLOGICAL FOUNDATIONS OF INFORMATION AND CYBER SECURITY IN THE CONTEXT OF DIGITALISATION OF SOCIAL PROCESSES
Olga KYVLIUK
125-131
PDF (Українська)
NEURAL NETWORK APPROACH TO DETECTING WATER OBJECTS IN MULTISPECTRAL IMAGES
Pavlo KUNDENKO, Oleksander SOKOL, Nataliia KALININA, Viktoriia HNATUSHENKO
132-143
PDF (Українська)
NEURAL NETWORK IDENTIFICATION OF PROPAGANDA GOALS IN TEXT CONTENT WITH VISUAL ANALYTICS OF RESULTS
Maryna MOLCHANOVA
144-150
PDF (Українська)
ADAPTIVE CONTROL SYSTEM OF THE SELF-GRINDING PROCESS OF ORES IN AUTOGENOUS MILLS
Igor NOVYTSKYI, Yuliia SHEVCHENKO, Maksym TRYPUTEN
151-158
PDF
METHODOLOGICAL FOUNDATIONS OF INFORMATION TECHNOLOGIES FOR THE ANALYSIS OF MULTI-CHANNEL AEROSPACE IMAGES
Viktor OLEVSKYI, Iryna UDOVYK, Dmytro HRYSHCHAK, Yuliia OLEVSKA, Yuliia ZHURAVLOVA
159-168
PDF (Українська)
CONCEPTUAL MODEL OF THE SOFTWARE ARCHITECTURE FOR PROCESSING MULTI-SOURCE ACOUSTIC SIGNALS
Serhii PRYKHODCHENKO, Larysa KORIASHKINA, Olha SHEVTSOVA, Yevhenii ZAHYNAILO
169-177
PDF (Українська)
METHOD FOR DETECTING MALICIOUS ACTIVITY IN INFECTED PROGRAMS
Pavlo REHIDA, Oleg SAVENKO
178-186
PDF (Українська)
APPLYING THE SYSTEMS APPROACH TO THE ANALYSIS OF REGIONAL-LEVEL MEDICAL LOGISTICS
Oleksii SERHIEIEV
187-196
PDF
NEURAL NETWORK SEARCH AND CLASSIFICATION OF CYBERBULLYING IN TEXT MESSAGES
Olena SOBKO
197-205
PDF (Українська)
BLOCK-COMPOSITION METHOD OF FORMING CONTROL SIGNATURES OF DIGITAL SYSTEMS OPERATION BASED ON THE PROPERTIES OF THE SIGNATURE FIELD TSF[2N,PM(X)]
Vitaliy TUPKALO
206-215
PDF (Українська)
MANAGEMENT OF THE OCCUPATIONAL HEALTH AND SAFETY SYSTEM AND PERSONNEL LIFE SAFETY IN PRODUCTION COMPANIES RELATED TO DATA PROTECTION
Liubov CHEREMISINA, Natalia MAKSYMOVYCH
216–223
PDF (Українська)
PSYCHOTECHNOLOGIES FOR CONFLICT RESOLUTION OF DEVELOPERS OF INFORMATION PROTECTION SYSTEMS IN THE CONDITIONS OF CYBER THREATS
Olesia CHERNIAKOVA
222–226
PDF (Українська)
TESTING OF REGULAR EXPRESSION APPARATUS IN ANALYSIS OF FUNCTIONAL PROFILE OF PROTECTION
Maksym SHABAN
227–229
PDF (Українська)
ORGANIZATION OF RULES FOR VERIFICATION OF THE FUNCTIONAL PROFILE OF PROTECTION
Maksym SHABAN, Natalia DIACHENKO
230–234
PDF (Українська)
IDENTIFICATION OF ENVIRONMENTAL DYNAMICS: CHALLENGES AND PROSPECTS OF DISTRIBUTED MODELING
Hennadii SHVACHYCH, Pavlo ISHCHUK
235–241
PDF (Українська)
BUILDING WEB APPLICATIONS WITH MODERN AUTHENTICATION SYSTEMS BASED ON OAUTH 2.0 PKCE AND BIOMETRICS TO ENHANCE THE CYBER RESILIENCE OF THESE APPLICATIONS
Andrii YARMOLATII, Liubov CHEREMISINA, Valentyn HALUNKO
242–251
PDF (Українська)
Language
English
Українська
1