Матеріали п'ятої науково-технічної конференції «Студентська Конференція Інформаційна, Функційна і Кібербезпека» (СКІФіК-2025)
Authors/Creators
Description
The collection presents the abstracts from the fifth student scientific and technical conference, “Student Conference Information, Functional, and Cybersecurity”. The proceedings cover a range of research areas, including: Information Security; Functional Safety; Cybersecurity; Information Security Management; Data Protection in Information and Communication Systems; Symmetric and Asymmetric Encryption Systems; Information Protection Systems for Web and Mobile Applications; Cloud Systems Security; Attack and Defense Methods utilizing Artificial Intelligence; Smart System Protection; Protection of the Internet of Things and Autonomous Systems; Regulatory and Legal Aspects of Information and Cybersecurity. The conference is structured into three dedicated sections: Information and Cybersecurity; Functional Safety; Cybersecurity Law and Regulation.
У збірнику подано тези доповідей п’ятої науково-технічної студентської конференції «Студентська Конференція Інформаційна, Функційна і Кібербезпека». Розглянуті питання за такими напрямами: інформаційна безпека; функційна безпека; кібербезпека; управління інформаційною безпекою; захист інформації в інформаційнокомунікаційних системах; системи симетричного та асиметричного шифрування; системи захисту інформації для веб та мобільних додатків; безпека хмарних систем; методи атак та захисту за допомогою штучного інтелекту; захист смарт-системи; захист інтернет речей та автономні системи; нормативно-правові аспекти інформаційної та кібербезпеки. Конференція поділена на три секції: інформаційна та кібербезпека; функційна безпека; правове забезпечення кібербезпеки.
Files
Збірник тез СКІФіК-2025 (SCIFIC_2025_Materials).pdf
Files
(2.6 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:81b4cb0f90b523b83084c89585d92cb8
|
2.6 MB | Preview Download |
Additional details
Additional titles
- Alternative title (English)
- Materials of the fifth scientific and technical conference "Student Conference on Information, Functional and Cybersecurity" (SCIFiC-2025)
Identifiers
- DOI
- 10.13140/RG.2.2.32148.16001
- ISBN
- 978-617-8587-21-5
- URL
- https://www.researchgate.net/publication/398071966
- URL
- https://drive.google.com/file/d/1JzL1CRqBpaJLvy6EcbTHwSYgq2paG5E1/view
- URL
- http://dspace.library.khai.edu/xmlui/handle/123456789/9243
- URL
- https://scific-conference.github.io/SCIFIC-conference/en/archive.html
Related works
- Is supplemented by
- Book: 10.13140/RG.2.2.32148.16001 (DOI)
- Book: 978-617-8587-21-5 (ISBN)
- Book: http://dspace.library.khai.edu/xmlui/handle/123456789/9243 (URL)
- Conference proceeding: https://scific-conference.github.io/SCIFIC-conference/en/archive.html (URL)
Dates
- Accepted
-
2025-11-27
- Created
-
2025-11-20
References
- A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in industrial internet of things / A. M. Alnajim et al. Technologies. 2023. Vol. 11, no. 6. P. 161. DOI: https://doi.org/10.3390/technologies11060161
- A Literature Survey on Data Leak Detection and Prevention Methods, ResearchGate, 2023. URL – https://www.researchgate.net/publication/396512210_A_Literature_Survey_on_Data_Leak_Detection_And_Prevention_Methods
- A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. MDPI. 2023. URL – https://www.mdpi.com/1424-8220/23/17/7470
- A. A. Saleem, M. M. Hassan and I. A. Ali, "Smart Homes Powered by Machine Learning: A Review", 2022 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2022, pp. 355-361, DOI: 10.1109/CSASE51777.2022.9759682
- Abbasi, M.; Cardoso, F.; Váz, P.; Silva, J.; Martins, P. A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments. Cryptography 2025, 9, 32. https://doi.org/10.3390/cryptography9020032
- Abdelhamid N., Ayesh A., Thabtah F. Phishing detection based associative classification data mining // Expert Systems with Applications. – 2014. – Vol. 41(13). – P. 5948–5959. DOI: https://doi.org/10.1016/j.eswa.2014.03.019
- Ågren M., Hell M., Johansson T., Meier W. Grain-128a: A new version of Grain-128 with optional authentication. ECRYPT Stream Cipher Workshop (SKEW 2011), Lund, Sweden. 2011. URL – https://lucris.lub.lu.se/ws/portalfiles/portal/6156802/1981684.pdf
- AI-Based Application Penetration Testing and Its Importance. Qualysec Blog. URL – https://qualysec.com/ai-penetration-testing
- Alam Tanweer. A Reliable Communication Framework and its Use in Internet of Things. May 1, 2018. CSEIT1835111. Vol (3)5 : 450-456, Available at SSRN: https://ssrn.com/abstract=3619450
- Alexei A. Gaivoronski, Pavel S. Knopov, Vladimir I. Norkin, Volodymyr A. Zaslavskyi. Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection. ISTE Ltd, London, UK; John Wiley&Sons, Inc.Hoboken, USA, 2025, 261 p
- Al-Hawari F., Barham H. A Machine Learning Based Help Desk System for IT Service Management. Journal of King Saud University - Computer and Information Sciences, Vol. 33, No. 6, 2019, pp. 702 -718
- Almeida D, Shmarko K, Lomas E. The ethics of facial recognition technologies, surveillance, and accountability in an age of artificial intelligence: a comparative analysis of US, EU, and UK regulatory frameworks. AI Ethics. 2022;2(3):377-387. DOI: 10.1007/s43681-021-00077-w
- Alothman A., Alotaibi A. A comprehensive review of botnet attacks and defense mechanisms // IEEE Access. – 2022. – Vol. 10. – P. 45678–45690. DOI: 10.1109/ACCESS.2022.3172345
- Alsaidi, M. (2024). Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. MDPI Sensors. URL: https://www.mdpi.com/1424-8220/24/11/3571
- Amazon попереджає співробітників про обережність із ChatGPT. Gizmodo. URL: https://gizmodo.com/amazon-chatgpt-ai-software-job-coding-1850034383
- Anatoly, P., Zemlianko, H., Kharchenko, V. (2020). Prototyping and Rapid Development of IoT Systems in Context of Edge Computing. In: Nechyporuk, M., Pavlikov, V., Kritskiy, D. (eds) Integrated Computer Technologies in Mechanical Engineering. Advances in Intelligent Systems and Computing, vol 1113. Springer, Cham. https://doi.org/10.1007/978-3-030-37618-5_23
- Apache mod_evasive – модуль захисту від DDoS. PhoenixNAP. URL: https://phoenixnap.com/kb/apache-mod-evasive
- ASERT Threat Summary: Aisuru and Related TurboMirai Botnet DDoS Attack Mitigation and Suppression. Netscout – URL: https://www.netscout.com/blog/asert/asert-threat-summary-aisuru-and-related-turbomirai-botnet-ddos
- Authentication and Account Protection. HubSpot Security Overview. URL – https://fs.hubspotusercontent00.net/hubfs/742851
- Authentication Cheat Sheet. OWASP Foundation. URL – https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html
- Authorization in MQTT: Using ACLs to Control Access to MQTT Messaging. EMQX. URL – https://www.emqx.com/en/blog/authorization-in-mqtt-using-acls-to-control-access-to-mqtt-messaging
- Azuma R. A Survey of Augmented Reality. *Presence: Teleoperators and Virtual Environments*, 1997. DOI: https://doi.org/10.1162/pres.1997.6.4.355
- Azuma, R. T. A Survey of Augmented Reality. Presence: Teleoperators and Virtual Environments. URL – https://www.cs.unc.edu/~azuma/ARpresence.pdf
- Basit, A., Zafar, M., Liu, X. et al. A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun Syst 76, P. 139–154 (2021). DOI: https://doi.org/10.1007/s11235-020-00733-2
- Bazazzadeh, H. ., Nadolny, A. ., & Safaei, S. S. H. . (2021). Climate Change and Building Energy Consumption: A Review of the Impact of Weather Parameters Influenced by Climate Change on Household Heating and Cooling Demands of Buildings. European Journal of Sustainable Development, 10(2), 1. DOI: https://doi.org/10.14207/ejsd.2021.v10n2p1
- Bellard F. (2024) TSAC, Very Low Bitrate Audio Codec, URL – https://bellard.org
- Bennouk, K.; Ait Aali, N.; El Bouzekri El Idrissi, Y.; Sebai, B.; Faroukhi, A.Z.; Mahouachi, D. A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies. J. Cybersecur. Priv. 2024, 4, 853-908. DOI: https://doi.org/10.3390/jcp4040040
- Bhadauria A., Sanyal S. Botnet detection and mitigation using machine learning techniques // International Journal of Information Security. – 2023. – Vol. 22. – P. 123–135. DOI: 10.1007/s10207–022–00615–3
- Binance App. Binance. URL – https://www.binance.com
- Birahim S. A. Contesting the algorithm: advancing a right to challenge AI decisions under the GDPR for algorithmic fairness. Transforming government: people, process and policy. 2025. DOI: https://doi.org/10.1108/tg-05-2025-0148
- Brian Carlson: Top cybersecurity statistics, trends, and facts. Csoonline. URL – https://www.csoonline.com/article/571367/top-cybersecurity-statistics-trends-and-facts.html
- Brysin P., Lukin V., DCT-based Denoising of Speech Signals, Herald of Khmelnytskyi National University. Technical sciences, No 4, 2024 (339), pp. 301-309. DOI: 10.31891/2307-5732-2024-339-4-4
- Carlini N., Zhang C., Zhang J. та ін. The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In: Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, 2019. P. 263-280
- Caruso, G., et al. User-Centered Evaluation Framework to Support the Interaction Design for Augmented Reality Applications. Multimodal Technologies and Interaction, 8(5) (2024). URL – https://www.mdpi.com/2414-4088/8/5/41
- Cavoukian, A. Privacy by Design: The 7 Foundational Principles. Information & Privacy Commissioner of Ontario, 2011
- CERT-UA минулого року опрацювала 4315 кіберінцидентів. Державна Служба Спеціального Зв'язку та Захисту Інформації. URL: https://cip.gov.ua/ua/news/cert-ua-minulogo-roku-opracyuvala-4315-kiberincidentiv
- Chang, R.-I., Yang, C., & Hsu, T.-W. (2025). An Automatic Sensitive Image Search System with Generative Artificial Intelligence to Identify Data Leaks on Internet. Electronics, 14(11), P. 2254. DOI: https://doi.org/10.3390/electronics14112254
- Common Weakness Enumeration (CWE). MITRE Corporation. URL – https://cwe.mitre.org
- Conti M., Dehghantanha A., Franke K., Watson S. Internet of Things security and forensics: Challenges and opportunities // Future Generation Computer Systems. – 2018. – № 78. – P. 544–546
- Cost of Insider Threats 2024 Report. Ponemon Institute. URL – https://www.proofpoint.com/us/resources/threat-reports/cost-of-insider-threats
- Cyberattacks and security of cloud computing: a complete guideline / M. Dawood et al. Symmetry. 2023. Vol. 15, no. 11. P. 1981. DOI: https://doi.org/10.3390/sym15111981
- Cybersecurity in Supply Chain Systems: The Farm-to-Fork Use Case / H. C. Leligou, A. Lakka, P. A. Karkazis [et al.] // Electronics. – 2024. – Vol. 13, No. 1. – Art. 215. DOI: 10.3390/electronics13010215
- D. Kirichenko and H. Zemlianko, "Smart home subsystems during emergency situations", Proceedings of the International Scientific Conference "Modern Trends in the Development of Science and Society", 2023. DOI: https://doi.org/10.64076/iedc251023.02
- David Temoshok. Digital Identity Guidelines: Authentication and Lifecycle Management: NIST Special Publication 800-63B. Gaithersburg, MD : National Institute of Standards and Technology, 2017. DOI: https://doi.org/10.6028/NIST.SP.800-63B-4
- Demmese F., Yuan X., Dicheva D. Evaluating the Effectiveness of Gamification on Students' Performance in a Cybersecurity Course. J. of The Colloquium for Information Systems Security Education. 2020. Vol. 8(1). P. 6–12. URL – https://cisse.info/journal/index.php/cisse/article/view/129
- Deng G., Liu Y., Mayoral-Vilches V., Li Y., Xu Y., Zhang T. PentestGPT: Evaluating and Harnessing Large Language Models for Penetration Testing [Електронний ресурс] // USENIX Security '24 Conference Proceedings. — 2024. URL: https://pentestgpt.ai
- Devlin J., Chang M.-W., Lee K., Toutanova K. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arXiv:1810.04805, 2019. URL: https://arxiv.org/abs/1810.04805
- Di Biagio, Lorenzo. Euler Pseudoprimes for Half of the Bases Integers, vol. 12, no. 6, 2012, pp. 1231-1237. DOI: https://doi.org/10.1515/integers-2012-0037
- Domnik, J., & Holland, A. (2024). On Data Leakage Prevention Maturity: Adapting the C2M2 Framework. Journal of Cybersecurity and Privacy, 4(2), 167-195. DOI: https://doi.org/10.3390/jcp4020009
- Dwork C., Roth A. The Algorithmic Foundations of Differential Privacy. Нью-Йорк : Now Publishers, 2014
- Dworkin, M. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions (NIST FIPS 202). URL: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.202.pdf
- ECE professors hack surgical robot in Motherboard special // University of Washington. URL: https://www.ece.uw.edu/spotlight/ee-professors-hack-surgical-robot-in-motherboard-special
- El-Hajj, M. Cybersecurity and Privacy Challenges in Extended Reality: Threats, Solutions, and Risk Mitigation Strategies. Virtual Worlds 2025, 4, 1. DOI: https://doi.org/10.3390/virtualworlds4010001
- Enkli Ylli, Dr. Julian Fejzaj. Man in the Middle: Attack and Protection. Recent Trends and Applications in Computer Science and Information Technology, University of Tirana, Albania, 21–22 трав. 2021. 2021. С. 198–204.
- Eriksen M. et al. A growing plastic smog. PLOS One, 2023
- Eriksen, M. et al. (2014). Plastic pollution in the world's oceans: more than 5 trillion plastic pieces weighing over 250,000 tons afloat at sea. PLoS ONE, 9(12): e111913
- European Union Agency for Cybersecurity (ENISA). Artificial Intelligence Threat Landscape. Heraklion : ENISA, 2023. 56 p
- Explainable artificial intelligence applications in cyber security: state-of-the-art in research / Z. Zhang et al. IEEE access. 2022. P. 1. DOI: https://doi.org/10.1109/access.2022.3204051
- Explainable artificial intelligence in cybersecurity: a survey / N. Capuano et al. IEEE access. 2022. P. 1. DOI: https://doi.org/10.1109/access.2022.3204171
- F. Schroff, D. Kalenichenko and J. Philbin, "FaceNet: A unified embedding for face recognition and clustering", in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 2015, pp. 815-823, DOI: 10.1109/CVPR.2015.7298682
- FluxCD Core Concepts. Fluxcd. URL – https://fluxcd.io/flux/concepts
- Gaivoronski A.A., Knopov P.S., Zaslavskyi V.A. (eds.). Modern Optimization Methods for Decision Making Under Risk and Uncertainty. CRC Press Taylor Francis Group, 2023. – P. 388
- Gartner, Inc. Market Guide for Data Loss Prevention. 2025. URL: https://www.paloaltonetworks.com/resources/research/gartner-2025-market-guide-data-loss-prevention
- GDPR for machine learning: data protection in AI development. GDPR Local. URL – https://gdprlocal.com/gdpr-machine-learning
- Geospatial knowledge infrastructure. Geospatial Media and Communications. URL – https://www.geospatialworld.net
- GitGuardian Documentation. GitGuardian. URL – https://docs.gitguardian.com
- Global Waste Management Outlook 2024: Beyond an age of waste – Turning rubbish into a resource / United Nations Environment Programme (UNEP). Nairobi: UNEP, 2024. P. 196. URL: https://wedocs.unep.org/bitstream/handle/20.500.11822/44939/global_waste_management_outlook_2024.pdf?sequence=3
- Goodfellow I. et al. Deep Learning. MIT Press, 2016. URL – http://www.deeplearningbook.org
- Grantham, Jon. "Frobenius pseudoprimes". Math. Comput. 70 (2001): P. 873-891. DOI: https://doi.org/10.1090/S0025-5718-00-01197-2
- H. Venugopalan, S. Munir, S. Ahmed, T. Wang, S. T. King, and Z. Shafiq, "FP‑Inconsistent: Detecting Evasive Bots using Browser Fingerprint Inconsistencies," arXiv preprint arXiv:2406.07647, Jun. 2024. DOI: 10.48550/arXiv.2406.07647
- H. Zhang, X. Wang. Cryptanalysis of Stream Cipher Grain Family. International Conference on Information Science and Technology. 2011. URL – https://eprint.iacr.org/2009/109
- Hardt, D. The OAuth 2.0 Authorization Framework (RFC 6749). Internet Engineering Task Force (IETF), 2012
- Health Connect data types. Android Developers. URL – https://developer.android.com/health-and-fitness/guides/health-connect/plan/data-types
- Hennes W. N. Brain Tumor for 14 Classes. Kaggle. URL – https://www.kaggle.com/datasets/waseemnagahhenes/brain-tumor-for-14-classes/data
- Heorhii Zemlianko, Vyacheslav Kharchenko, "Cybersecurity Risk Analysis of Multifunctional UAV Fleet Systems: A Conceptual Model and IMECA-Based Technique", Radioelectronic and Computer Systems, December 2023. DOI: https://doi.org/10.32620/reks.2023.4.11
- Herrera Montano, I., García Aranda, J.J., Ramos Diaz, J. et al. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. Cluster Comput 25, 4289–4302 (2022). DOI: 10.1007/s10586-022-03668-2
- Honeypots in Cybersecurity: Their Analysis, Evaluation and Importance. URL – https://www.preprints.org/manuscript/202408.0946
- Hristov E., Petrova-Antonova D., De Paoli F. Geospatial Data Enrichment through Address Geocoding: Challenges and Solutions // The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences. – 2024. – XLVIII-4. – С. 239–245. DOI: 10.5194/isprs-archives-XLVIII-4-2024-239-2024
- Hunter, C., Bowen, B. E. (2024). We'll never have a model of an AI major-general: Artificial Intelligence, command decisions, and kitsch visions of war. Journal of Strategic Studies, 47(1), 116-146. DOI: https://doi.org/10.1080/01402390.2023.2241648
- Hwang Y.-W., Lee I.-Y., Kim H., Lee H., & Kim D. Current Status and Security Trend of OSINT. // Wireless Communications and Mobile Computing, 2022. – C. 14. DOI: https://doi.org/10.1155/2022/12901291
- IEC 62351: Secure communication in the energy industry. COPA-DATA Blog. URL – https://blog.copadata.com/iec-62351-secure-communication-in-the-energy-industry
- IEEE P2048.1. Standard for Virtual and Augmented Reality: Device Taxonomy and Definitions. IEEE. URL – https://sagroups.ieee.org/2048wg/
- Ieremeiev, O.; Lukin, V.; Okarma, K.; Egiazarian, K. Full-Reference Quality Metric Based on Neural Network to Assess the Visual Quality of Remote Sensing Images. Remote Sens. 2020, 12, 2349. DOI: https://doi.org/10.3390/rs12152349
- Ikeoluwa K. Advancing u.s. national security with cloud computing: strengthening intelligence, cyber resilience, and homeland defense strategies. International journal of engineering technology research & management (ijetrm). 2025. Vol. 09, no. 02. DOI: https://doi.org/10.5281/zenodo.14937982
- Illiashenko O., Kharchenko V., Babeshko I., Fesenko H., & Di Giandomenico F. Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy, 2023, vol. 25, article no. 1123
- Information Security Management Systems. ISO/IEC 27001:2022 / International Organization for Standardization (ISO). URL – https://www.iso.org/standard/27001
- IoT Forecast Highlights. Transforma Insights. URL – https://transformainsights.com/research/forecast/highlights
- ISO 9241-210:2019. Ergonomics of human-system interaction – Part 210: Human-centred design for interactive systems. URL – https://www.iso.org/standard/77520.html
- ISO/IEC 25010:2011. Systems and software engineering – Systems and software Quality Requirements and Evaluation (SQuaRE). ISO. URL – https://www.iso.org/standard/35733.html
- ISO/IEC 27001:2022 – Information Security Management Systems – Requirements. International Organization for Standardization
- John W. Mohr, Robin Wagner-Pacifici, Ronald L. Breiger, Petko Bogdanov. Graphing the grammar of motives in National Security Strategies: Cultural interpretation, automated text analysis and the drama of global politics, Poetics, Volume 41, Issue 6, 2013, P. 670-700, ISSN 0304-422X. DOI: https://doi.org/10.1016/j.poetic.2013.08.003
- Jordyn Alger. New Research: Multi-Stage Malware Attack on Python Package Index Discovered. Security Magazine. URL – https://www.securitymagazine.com/articles/101700-new-research-multi-stage-malware-attack-on-python-package-index-discovered
- K. Zhang, Y. Li, W. Zuo, L. Zhang, L. Van Gool, and R. Timofte, "Plug-and-Play Image Restoration with Deep Denoiser Prior," arXiv, 2022. DOI: https://doi.org/10.48550/arXiv.2008.13751
- Kaandorp M. L. A. Global mass of buoyant marine plastics Nature eoscience, 2023
- Kaur R., Gabrijelčić D., Klobučar T. Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions. Information Fusion, 2023. DOI: https://doi.org/10.1016/j.inffus.2023.101804
- Key Cyber Security Statistics for 2025. SentinelOne. URL – https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-statistics
- Kharchenko V, Illiashenko O, Sklyar V. Invariant-Based Safety Assessment of FPGA Projects: Conception and Technique. Computers. 2021; 10(10):125. DOI: https://doi.org/10.3390/computers10100125
- Khonji M., Iraqi Y., Jones S. A survey on phishing detection techniques // IEEE Communications Surveys & Tutorials. – 2013. – Vol. 15(4). – P. 2091–2121. DOI: https://doi.org/10.1109/SURV.2013.032213.00009
- Kilic B., Hacar M., Gülgen F. Effects of reverse geocoding on OpenStreetMap tag quality assessment // Transactions in GIS. – 2023. – Vol. 00. – P. 1–15. DOI: 10.1111/tgis.13089
- Kirichenko D. Cybersecurity of smart homes. Abstracts of reports from the "Student Conference on Information, Functional, and Cyber Security": IV Scientific and Practical Conference "Student Conference on Information, Functional, and Cyber Security of SCIFiC," Kharkiv, Nov. 29–Oct. 30, 2024. Kharkiv, 2024. P. 48. DOI: https://doi.org/10.13140/RG.2.2.14272.75521
- Kraut M. E. Children and Cyberbullying. Child Crime Prevention & Safety Center. URL – https://childsafety.losangelescriminallawyer.pro/children-and-cyberbullying.html
- Krivenko S. Smart lossy compression of images based on distortion prediction. KNMU Technical Report, 2018. DOI: 10.1615/TelecomRadEng.v77.i17.40
- Kumar R., Seetharaman P., Luebs A. (2023). High-Fidelity Audio Compression with Improved RVQGAN. DOI: 10.48550/arXiv.2306.06546
- Kumar Y., Kumar V. A systematic review on intrusion detection system in wireless networks: variants, attacks, and applications. Wireless personal communications. 2023. DOI: https://doi.org/10.1007/s11277-023-10773-x
- Kyforuk Yu.M., Petrosyan P.A., Kravchenko K.S., Puchenina M.R., Kondrachuk S.S., Andreev S.M. Creation of aerospace monitoring of pollution of oceans and seas by plastic emissions. // Dnipro Orbit – 2025: materials of the XX scientific readings (October 22–24, 2025). National Center for Aerospace Education of Youth named after O.M. Makarov, SE "Design Bureau Yuzhnoye" named after M.K. Yangel, National Museum of Cosmonautics named after S.P. Korolev, Dnipro National University named after O. Honchar. – Dnipro, 2025. – P. 213–214
- Lampropoulos G., Sidiropoulos A. Impact of Gamification on Students' Learning Outcomes and Academic Performance: A Longitudinal Study. Education Sciences. 2024. Vol. 14(4). Article 367. DOI: https://doi.org/10.3390/educsci14040367
- Law of Ukraine «On Personal Data Protection» dated 01.06.2010 No. 2297-VI. URL – https://zakon.rada.gov.ua/laws/show/2297-17
- Lebreton, L. et al. (2018). Evidence that the Great Pacific Garbage Patch is rapidly accumulating plastic. Scientific Reports, 8:4666
- Lee J. S. Digital image enhancement and noise filtering by use of local statistics / J. S. Lee // IEEE Transactions on Pattern Analysis and Machine Intelligence. – 1980. – Vol. 2, № 2. – P. 165–168. DOI: https://doi.org/10.1109/TPAMI.1980.4766994
- Léonard C., Stober D., Schulz M. FPGA-Enabled Machine Learning Applications in Earth Observation: A Systematic Review // arXiv preprint arXiv:2506.03938. – Technical University of Munich, DLR, 2025. DOI: https://doi.org/10.48550/arXiv.2506.03938
- Li D., Gamage D., Peng S. Mapping the Completeness and Positional Accuracy of OpenStreetMap Road Data at the County Level in the Contiguous United States // Transactions in GIS. – 2025. – DOI: 10.1111/tgis.70077
- Li L., Zhang J., Chen Y. Machine Learning-Assisted Hardware Design and Verification: A Survey // ACM Transactions on Design Automation of Electronic Systems (TODAES). – 2024. – Vol. 29, No. 1. – P. 1–42. DOI: https://doi.org/10.1145/3661308
- Li M., Ma S. Examining the effectiveness of gamification as a tool promoting teaching and learning in educational settings. Frontiers in Psychology. 2023. Vol. 14. Article 1253549. DOI: https://doi.org/10.3389/fpsyg.2023.1253549
- Li X., Zhang Q. Artificial intelligence–driven botnet detection in IoT networks // IEEE Internet of Things Journal. – 2024. – Vol. 11, No. 3. – P. 4567–4578. DOI: 10.1109/JIOT.2023.3298765
- Liao X. Smart contact vulnerability detection based on dynamic and static combination: Proceedings of the International Conference on Digital Economy, Blockchain and Artificial Intelligence, 23–25 august 2024, Guangzhou, China, 2024. – PP. 412–416
- Lisitsky D., et al. The evolution of mapping: from geodata to geoinformation and geoknowledge // SGEM Conference Proceedings. – 2021
- Liu, H., et al. (2023). QoS-based Resilient Communication Framework for Spaceborne Telemetry Systems. Journal of Network and Computer Applications, 220, 103656
- Lukin V. An Approach to Prediction of Signal-Dependent Noise Removal Efficiency by DCT-Based Filter / V. Lukin, S. Abramov, A. Rubel, S. Krivenko, A. Naumenko, B. Vozel, K. Chehdi, K. Egiazarian, J. Astola // Telecommunications and Radio Engineering. – 2014. – Vol. 73, № 18. – P. 1645–1659. DOI: https://doi.org/10.1615/TelecomRadEng.v73.i18.40
- Lukin V., Kryvenko L., et al. Visually lossless compression of dental images. Advanced Optical Technologies (Frontiers), 2024, Article 1306142. DOI: https://doi.org/10.3389/aot.2024.1306142
- Luliano G., Nucci D. Smart contact vulnerabilities, tools, and benchmarks: an updated systematic literature review. URL – https://arxiv.org/abs/2412.01719
- M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali and M. Guizani, "A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security", in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1646-1685, thirdquarter 2020, DOI: 10.1109/COMST.2020.2988293
- M. Bagaa, T. Taleb, J. B. Bernabe and A. Skarmeta, "A Machine Learning Security Framework for Iot Systems", in IEEE Access, vol. 8, pp. 114066-114077, 2020, DOI: 10.1109/ACCESS.2020.2996214
- M. Harter, "LLM Assisted No-code HMI Development for Safety-Critical Systems: Insights of a Short Empirical Study",(CENTRIC 2023), Valencia, Spain, Nov. 13-17, 2023, pp. 8-18
- M. Wahl, M. Stoll, and J. S. R. Vazquez. Characterization of a Quantum Random Number Generator Based on Homodyne Detection. Applied Sciences. 2021. 11(16), 7413. URL – https://www.mdpi.com/2076-3417/11/16/7413
- Ma, Wenxin, et al. "Aa-clip: Enhancing zero-shot anomaly detection via anomaly-aware clip". Proceedings of the Computer Vision and Pattern Recognition Conference. 2025. DOI: https://doi.org/10.48550/arXiv.2503.06661
- Ma, X., et al. (2013). Postprocessing for quantum random-number generators: Entropy evaluation and randomness extraction. Physical Review A, 87(6). URL: https://arxiv.org/pdf/1207.1473
- Masukawa, Ryozo, et al. "PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning". arXiv preprint arXiv: 2503.03747. 2025
- Mehta J, Rana H. Safest-Value of the Number of Primes in RSA Modulus and an Improvised Generalized Multi-Moduli RSA. Mathematics. 2025; 13(10):1690. DOI: https://doi.org/10.3390/math13101690
- Microsoft Digital Defense Report 2025. Microsoft. URL – https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025?msockid=3043950b234760192cb984bd274766c4
- Milgram, P., Kishino, F. A taxonomy of mixed reality visual displays. IEICE Transactions on Information and Systems, E77-D, № 12, pp. 1321– 1329 (1994). URL – https://www.alice.id.tue.nl/references/milgram-kishino1994.pdf
- Modeling data protection and privacy: application and experience with GDPR / D. Torre et al. Software and systems modeling. 2021. Vol. 20, no. 6. P. 2071–2087. DOI: https://doi.org/10.1007/s10270-021-00935-5
- Mohamed N. Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent engineering. 2023. Vol. 10, no. 2. DOI: https://doi.org/10.1080/23311916.2023.2272358
- Monier L. Evaluation and comparison of two efficient probabilistic primality testing algorithms. Theoretical Computer Science 12 -1980. – P. 97 – 108. DOI: https://doi.org/10.1016/0304-3975(80)90007-9
- Muhammad Z., Anwar Z., Javed A. R., Saleem B., Abbas S., Gadekallu T. R. Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses. *Technologies*, 2023, 11(3): 76. DOI: https://doi.org/10.3390/technologies11030076
- N. M. Karie, N. M. Sahri, W. Yang, C. Valli and V. R. Kebande, "A Review of Security Standards and Frameworks for IoT-Based Smart Environments", in IEEE Access, vol. 9, pp. 121975-121995, 2021, DOI: 10.1109/ACCESS.2021.3109886
- N. Pape and C. Mansour, "Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis," 2023 International Conference On Cyber Management And Engineering (CyMaEn), Bangkok, Thailand, 2023, pp. 123-127, DOI: 10.1109/CyMaEn57228.2023.10051091
- Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. 9 p. DOI: http://dx.doi.org/10.2139/ssrn.3440802
- National Institute of Standards and Technology (NIST). Augmented Reality (AR) Usability Evaluation Framework. NIST Interagency/Internal Report (NISTIR) 8422. URL – https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8422.pdf
- National Institute of Standards and Technology. SP 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation. NIST Computer Security Resource Center. 2018. URL – https://csrc.nist.gov/pubs/sp/800/90/b/final
- NestJS Documentation. Security Best Practices: Authentication, CORS, CSRF, and HTTPS. URL: https://docs.nestjs.com/security
- NIST AI Risk Management Framework (AI RMF 1.0). NIST. URL – https://www.nist.gov/itl/ai-risk-management-framework
- NIST SP 800‑66 Rev. 2 HIPAA Security Rule: A Cybersecurity Resource Guide. NIST. URL – https://csrc.nist.gov/publications/detail/sp/800-66/rev-2/final
- NIST Special Publication 800-63B: Digital Identity Guidelines – Authentication and Lifecycle Management. – National Institute of Standards and Technology, 2023. URL: https://pages.nist.gov/800-63-3/sp800-63b.html
- NIST. Managing Cybersecurity and Privacy Risks in the Age of Artificial Intelligence. National Institute of Standards and Technology, 2024. URL: https://www.nist.gov/blogs/cybersecurity-insights
- Niyonsaba S., Konate K., & Soidridine M. M. A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions. International Journal of Computer Networks and Applications, 2023, vol. 10, no. 5, pp. 688-701
- O. Illiashenko and V. Pevnev, "Development of large numbers factorization algorithm", in 2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Metz, France, Sep. 18–21, 2019. IEEE, 2019. DOI: https://doi.org/10.1109/idaacs.2019.8924341
- O. Illiashenko, V. Kharchenko, I. Babeshko, H. Fesenko, F. Di Giandomenico, Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyberattacks and Protection. Entropy. 25.8, 1123. 2023. P.1-35. DOI:10.3390/e25081123
- O. Neretin, V. Kharchenko. A model of ensuring LLM cybersecurity. Radioelectronic and Computer Systems, 2025 (2) p. 201–215, DOI: https://doi.org/10.32620/reks.2025.2.13
- Oleksandra B. A global approach to preventing plastic from entering the ocean. ArcGIS Journal, 2023
- Olena Veprytska, Vyacheslav Kharchenko, and Oleg Illiashenko. 2025. Cybersecurity and Artificial Intelligence: Triad-Based Analysis and Attacks Review. Cybern. Inf. Technol. Vol 25, 3. September 2025. P. 156–185. DOI: https://doi.org/10.2478/cait-2025-0028
- Omkar M. Parkhi, Andrea Vedaldi and Andrew Zisserman. Deep Face Recognition. In Xianghua Xie, Mark W. Jones, and Gary K. L. Tam, editors, Proceedings of the British Machine Vision Conference (BMVC), pages 41.1-41.12. BMVA Press, September 2015. DOI: https://dx.doi.org/10.5244/C.29.41
- Paperless-ngx documentation. Paperless-ngx. URL – https://docs.paperless-ngx.com
- Password statistics and trends. JumpCloud blog. URL: https://jumpcloud.com/blog/password-statistics-trends
- Pennarun A. Tailscale: how it works. Tailscale Best VPN Service for Secure Networks. Tailscale. URL – https://tailscale.com/blog/how-tailscale-works
- Petit J., Shladover S.E. Potential Cyberattacks on Automated Vehicles. IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 2, 2015
- Pevnev V. Ya., Toryanyk V. V., & Kharchenko V. S. Cybersecurity of Wireless Smart Systems: Interference Channels and Radio Frequency Vulnerabilities. Radioelectronic and Computer Systems, 2020, no. 4, pp. 79-92. DOI: https://doi.org/10.32620/reks.2020.4.07
- Pevnev, V., Plakhteev, A., Tsuranov, M., Zemlianko, H., Leichenko, K. (2022). "Smart City" Technology: Conception, Security Issues and Cases. In: Nechyporuk, M., Pavlikov, V., Kritskiy, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2021. ICTM 2021. Lecture Notes in Networks and Systems, vol 367. Springer, Cham. https://doi.org/10.1007/978-3-030-94259-5_19
- Pevnev, V., Tsuranov, M., Zemlianko, H., Amelina, O. (2021). Conceptual Model of Information Security. In: Nechyporuk, M., Pavlikov, V., Kritskiy, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2020. ICTM 2020. Lecture Notes in Networks and Systems, vol 188. Springer, Cham. https://doi.org/10.1007/978-3-030-66717-7_14
- Pevnev, V., Frolov, A., Tsuranov, M., & Zemlianko, H. (2022). Ensuring the data integrity in infocommunication systems. International Journal of Computing, 228–233. https://doi.org/10.47839/ijc.21.2.2591
- Phishing Activity Trends Report 2024. Anti-Phishing Working Group. URL – https://apwg.org/trendsreports
- Picard R. W. The Evolution of Affective Computing. Nature Machine Intelligence. 2023. P. 204–210.
- Ponomarenko N. N., Lukin V. V., Egiazarian K., Astola J. ADCTC: Advanced DCT-based image coder. Proc. of LNLA, 2008. – P. 83–94
- Pratama D., Singh R., Mendez S. CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researchers // Sensors. – 2024. – Vol. 24, No. 21. – 6878. DOI: 10.3390/s24216878
- Qureshi, I.; Habeeb, M.A.; Shadab, S.G.M.; Mohammad, B.; Irfan, M.; Shavalliuddin, S.M.; Gupta, M. Examining Techniques to Enhance the Security and Privacy of IoT Devices and Networks against Cyber Threats. Eng. Proc. 2024, 62, 23. DOI: https://doi.org/10.3390/engproc2024062023
- Radford, Alec, et al. "Learning transferable visual models from natural language supervision". International conference on machine learning. PmLR, 2021. DOI: https://doi.org/10.48550/arXiv.2103.00020
- Rajpoot V. S., Singh A. P. Biometric Authentication Techniques: A Study on Keystroke Dynamics. International Journal of Scientific Engineering and Applied Science (IJSEAS). 2016. Vol. 2, Issue 1. P. 215–218. URL: https://ijseas.com/volume2/v2i1/ijseas20160125.pdf
- Ren M., Cao K., Betz V. Large Language Models for Hardware Design: Opportunities and Challenges in HDL Generation and Verification // IEEE Access. – 2023. – Vol. 11. – P. 56745–56759. DOI: https://doi.org/10.1109/ACCESS.2023.3264910
- Resende P.A.A., Drummond A.C. A Survey of Random Forest Based Methods for Intrusion Detection Systems. // ACM Computing Surveys (CSUR), 2018, Vol. 51, Issue 3, Article 48, P. 1–36
- Roman R., Zhou J., Lopez J. On the features and challenges of security and privacy in distributed internet of things // Computer Networks. – 2013. – № 57. – P. 2266–2279
- Ron A., Shulman-Peleg A., Puzanov A. Analysis and mitigation of nosql injections. IEEE security & privacy. 2016. Vol. 14, no. 2. P. 30–39. DOI: https://doi.org/10.1109/msp.2016.36
- Rose S., Borchert O., Mitchell S., Connelly S. Zero Trust Architecture: NIST SP 800-207.NIST, 2020. URL: https://nvlpubs.nist.gov/ nistpubs/ specialpublications/NIST.SP.800-207.pdf
- Rubel O. Selection of Lee filter window size based on despeckling efficiency prediction for Sentinel SAR images / O. Rubel, V. Lukin, A. Rubel, K. Egiazarian // Remote Sensing. – 2021. – Vol. 13, № 10. – P. 1887. DOI: https://doi.org/10.3390/rs13101887
- Ruslan Demura, Vyacheslav Kharchenko, Vitaly Levashenko, "Cybersecurity of UAV Swarm Communication using VPN and RIS Technologies Integration: Protected Assets, IMECA Analysis and Countermeasures", DESSERT 2024, December 2024, pp. 1. DOI: https://doi.org/10.1109/DESSERT65323.2024.11122116
- S. Abramov, O. Rubel, V. Lukin, A. Shelestov, M. Lavreniuk, "Speckle reducing for Sentinel-1 SAR data," Proceedings of the International Geoscience and Remote Sensing Symposium (IGARSS), Fort Worth, TX, USA, December 4, 2017, pp. 2353-2356. DOI: https://doi.org/10.1109/IGARSS.2017.8127463
- S. Chopra, R. Hadsell and Y. LeCun, "Learning a similarity metric discriminatively, with application to face verification," 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), San Diego, CA, USA, 2005, pp. 539-546 vol. 1, DOI: 10.1109/CVPR.2005.202
- S. Cresci and A. Petrocchi, "Better safe than sorry: An adversarial approach to improve social bot detection," in Proceedings of the 11th ACM Conference on Web Science (WebSci'19), Boston, MA, US, June 30–July 3, 2019. DOI: 10.1145/3292522.3326030
- S. Pelekis, T. Koutroubas, A. Blika, A. Berdelis, E. Karakolis, C. Ntanos, E. Spiliotis, and D. Askounis, "Adversarial machine learning: a review of methods, tools, and critical industry sectors," Artificial Intelligence Review, vol. 58, no. 8, p. 226, 2025. DOI: https://doi.org/10.1007/s10462-025-11147-4
- S. Syarova, S. Toleva - Stoimenova, A. Kirkov, S. Petkov, and K. Traykov, «Data leakage prevention and detection in digital configurations: а survey», ETR, vol. 2, pp. 253–258, Jun. 2024, DOI: 10.17770/etr2024vol2.8045
- Samsung Bans Staff's AI Use After Spotting ChatGPT Data Leak. Bloomberg. URL – https://www.bloomberg.com/news/articles/2023-05-02/samsung-bans-chatgpt-and-other-generative-ai-use-by-staff-after-leak
- Schroff F., Kalenichenko D., Philbin J. FaceNet: A Unified Embedding for Face Recognition. Google Research. URL: https://arxiv.org/abs/1503.03832
- Scott, R. Larger Tumor Size Linked to Higher Mortality Risk in Brain Can-cer. CURE Today. URL – https://www.curetoday.com/view/larger-tumor-size-linked-to-higher-mortality-risk-in-brain-cancer
- Selecting the Perfect Tools for Effective Penetration Testing: A Comprehensive Guide. Eurofins Digitaltesting. URL – https://www.eurofins-digitaltesting.com/ selecting-the-perfect-tools-for-effective-penetration-testing-a-comprehensive-guide/
- Server-Side vs Client-Side Tracking: A Simple Guide. Snowplow Blog. URL – https://snowplow.io/blog/server-side-vs-client-side-tracking
- Shen, W., & Zhang, Y. (2024). Secure Telemetry Data Transmission for Satellite Networks under DDoS Conditions. IEEE Transactions on Aerospace and Electronic Systems. DOI: 10.1109/TAES.2024.3298764.
- Sicari S., Rizzardi A., Grieco L.A., Coen-Porisini A. Security, privacy and trust in Internet of Things: The road ahead // Computer Networks. – 2015. – № 76. – P. 146–164
- Simulated adversarial attacks on traffic sign recognition of autonomous vehicles / H. Lin et al. Ieee ecice 2024. Basel Switzerland, 2025. P. 15. DOI: https://doi.org/10.3390/engproc2025092015
- Singh A., Jain R. Automated response mechanisms for botnet attacks in enterprise networks // Journal of Network and Computer Applications. – 2022. – Vol. 198. – P. 103289. DOI: 10.1016/j.jnca.2021.103289
- Snyk. Open Source Security Scanning. Snyk. URL – https://snyk.io/product/open-source-security-scanning
- Sommer R., Paxson V. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. IEEE Symposium on Security and Privacy, 2010. DOI: https://doi.org/10.1109/SP.2010.25
- Statista. Internet of Things (IoT) connected devices installed base worldwide from 2019 to 2030. Statista. URL – https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide
- Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines. NIST. URL – https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204D.pdf
- Teşeleanu G. Partial Exposure Attacks Against a Family of RSA-like Cryptosystems. Cryptography. 2025; 9(1): 2. DOI: https://doi.org/10.3390/cryptography9010002
- The ethics of facial recognition technologies, surveillance, and accountability in an age of artificial intelligence: a comparative analysis of US, EU, and UK regulatory frameworks – Denise Almeida, Konstantin Shmarko, Elizabeth Lomas. URL: https://pmc.ncbi.nlm.nih.gov/articles/PMC8320316/
- The On-Line Encyclopedia of Integer Sequences. Number of base-2 Euler pseudoprimes.–URL: https://oeis.org/A006970
- Torianyk, V., Kharchenko, V., & Zemlianko, H. (2021, March). IMECA Based Assessment of Internet of Drones Systems Cyber Security Considering Radio Frequency Vulnerabilities. In IntelITSIS (pp. 460-470).
- Trivy – Simple and Comprehensive Vulnerability Scanner. Aqua Security. URL – https://aquasecurity.github.io/trivy/
- Unity AR Foundation Documentation. Unity Technologies. URL – https://docs.unity3d.com/Packages/com.unity.xr.arfoundation
- V. Kharchenko, H. Fesenko, O. Illiashenko, Quality Models for Artificial Intelligence Systems: Characteristic-Based Approach, Development and Application, Sensors, 22.13, 4865(2022). P. 1-32. DOI: 10.3390/s22134865
- V. Lukin, M. Zriakhov, A. Popov, O. Pogrebnyak, Preliminary Processing and Lossy Compression of Multichannel Information Data, Industrial Informatics, Research in Computing Science, Vol. 31, 2007, pp. 105-114
- V. Pevnev, O. Yudin, P. Sedlaček, and N. Kuchuk, "Method of testing large numbers for primality", Advanced Information Systems, vol. 8, no. 2, pp. 99–106, Jun. 2024. DOI: https://doi.org/10.20998/2522-9052.2024.2.11
- Vadhan, S. P. (2012). Pseudorandomness: Randomness Extractors. Foundations and Trends® in Theoretical Computer Science, 7(1–3). URL: https://people.seas.harvard.edu/~salil/pseudorandomness/extractors.pdf
- Volkovitch V., Zaslavsky V., Franchuk O. A decision making support system for marketing "SPRUT" // Information Infrastructure for free Market Societies in Transition Eds. V.M. Shalamanov and T.D. Tagarev Proc. AFCEA-Europe (Sofia Seminar 26-28 April, 1995) - P.55-56
- Wang Z. Construction of Software Supply Chain Threat Portrait Based on Chain Perspective / Z. Wang, Y. Zhang, C. Li // Mathematics. – 2023. – Vol. 11, No. 23. – Art. 4856. DOI: 10.3390/math11234856
- WebAuthn & FIDO2 Technical Overview. FIDO Alliance. URL –https://fidoalliance.org/specifications
- White M., Black E., Robinson K. Revolutionizing Penetration Testing: AI-Powered Automation for Enterprise Security [Електронний ресурс] // ResearchGate. – 2024. – URL: https://www.researchgate.net/publication/387043979_Revolutionizing_Penetration_Testing_AI-Powered_Automation_for_Enterprise_Security
- Whitehead J. Father-of-three diagnosed with brain tumour claims doc-tors missed it for 12 years. The Independent. URL – https://www.the-independent.com/life-style/health-and-families/brain-tumour-missed-doctors-wales-b2171899.html
- WMS, The good, bad and the ugly. Reddit. URL –https://www.reddit.com/r/Warehousing/comments/1f7tp17/wms_the_good_bad_and_the_ugly
- Yang Q., Liu X. Synthetic data generation for botnet detection in IoT networks // IEEE Access. – 2024. – Vol. 12. – P. 56789–56798. DOI: 10.1109 ACCESS.2024.3389012
- Yavor O., Piddubna V., Ruban O. Legal concerns regarding the protection of minors' personal data in compliance with national legislation and GDPR requirements. ScienceRise: juridical science. 2023. No. 3(25). P. 23–34. DOI: https://doi.org/10.15587/2523-4153.2023.286647
- Yogendra Kumar, Vijay Kumar, "A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications", ACM Computing Surveys, vol. 133, p. 395–452, Dec. 2023. DOI: https://doi.org/10.1007/s11277-023-10773-x
- Yousef R., Jazzar M. Measuring the Effectiveness of User and Entity Behavior Analytics for the Prevention of Insider Threats.Journal of Xi'an University of Architecture & Technology, 2021, Vol. XIII (10), pp. 175–181. DOI: 10.37896/JXAT13.10/313918
- Zemlianko, H., & Kharchenko, V. (2023). Cybersecurity risk analysis of multifunctional UAV fleet systems: a conceptual model and IMECA-based technique.
- Zemlianko, H., Kharchenko, V. (2024). Ensuring Cybersecurity of the Cyber Physical System of Combined Fleets of Unmanned Aerial, Ground and Sea Vehicles. In: Nechyporuk, M., Pavlikov, V., Krytskyi, D. (eds) Integrated Computer Technologies in Mechanical Engineering - 2023. ICTM 2023. Lecture Notes in Networks and Systems, vol 996. Springer, Cham. https://doi.org/10.1007/978-3-031-60549-9_29
- Zero Trust Architecture. NIST SP 800‑207. NIST. URL – https://csrc.nist.gov/publications/detail/sp/800-207/final
- Zero-Day Exploit Statistics: The 2025 Threat Report for Defenders. URL – https://deepstrike.io/blog/zero-day-exploit-statistics-2025
- Zhang Z., Yong F. Study on the security of government portal websites. Applied mechanics and materials. 2013. Vol. 380-384. P. 2534–2538. DOI: https://doi.org/10.4028/www.scientific.net/amm.380-384.2534
- Zhao L., et al. Sensor Attack Taxonomy and Defense Mechanisms in Cyber–Physical Systems. IEEE Internet of Things Journal, 2023
- Біленчук П.Д., Шевченко В.В. Електронне врядування: навчальний посібник. К.: Академія, 2015. 240 с.
- Біометричні рішення безпеки. Biosol. URL – https://biosol.ua
- В Україні за рік кількість кібератак зросла на 70%: найпоширеніші типи інцидентів і головні цілі хакерів. Forbes Ukraine. URL: https://forbes.ua/news/v-ukraini-za-rik-kilkist-kiberatak-zrosla-na-70-nayposhirenishi-tipi-intsidentiv-i-golovni-tsili-khakeriv-08012025-26137
- Васильченко Д. І., Лавровський І. М. Огляд типових уразливостей Web-сайтів організацій у 2019-2020 році. СУЧАСНИЙ ЗАХИСТ ІНФОРМАЦІЇ. 2021. С. 41–43. ISSN 2409‐7292. URL: https://journals.dut.edu.ua/index.php/dataprotect/article/view/2503/2404
- Загнібеда А.О. Безкоштовні сервіси для оцінки складності та генерації паролів. Тези, с. 40. URL: https://repository.hneu.edu.ua/bitstream/123456789/35624/3/foss-2025-theses.pdf
- Закон України "Про електронні комунікації" від 16 грудня 2020 року № 1089-IX.URL: https://zakon.rada.gov.ua/laws/show/1089-20#Text
- Звіт за І півріччя. Державна служба спеціального зв'язку та захисту інформації України. URL – https://cip.gov.ua/services/cm/api/attachment/download?id=71278
- ЗЕМЛЯНКО, Г. А. (2024). Методи та засоби для забезпечення кібербезпеки системи багатофункційних флотів безпілотних апаратів в умовах комбінованих кібератак (Doctoral dissertation, Національний аерокосмічний університет ім. МЄ Жуковського).
- ЗЕМЛЯНКО, Г., & ХАРЧЕНКО, В. (2023). ІМЕСА-аналіз кібербезпеки систем багатофункціональних флотів БПЛА при комбінованих атаках: базові моделі та вибір контрзаходів. Measuring and computing devices in technological processes, (4), 225-233.
- Інтелектуальні системи підтримки прийняття рішень у сфері обслуговування клієнтів. Nauka Online. URL – https://nauka-online.com/article/intelligent-systems-helpdesk-ml
- Каршерінг. Fra.org. URL – https://fra.org.ua/uk/an/publikatsii/analitika/karshieringhova-ievropieis-ka-istoriia
- Кириченко О.А. Електронне врядування в Україні: проблеми та перспективи розвитку // Державне управління: теорія та практика. 2021. № 1
- Кифорук Ю.М Створення аерокосмічного моніторингу забруднення океанів та морів виходами пластика // Дніпровська орбіта – 2025: матеріали ХХ наукових читань (22-24 жовтня 2025 р.) / Нац. центр аерокосмічної освіти молоді ім. О.М. Макарова, ДП "Конструкторське бюро "Південне" ім. М.К. Янгеля" Нац. музей космонавтики ім. С.П. Корольова, Дніпровський нац. ун-т ім. О. Гончара.– Дніпро, 2025.– С. 213-214
- Кравченко О.М. Цифровізація та правове регулювання публічних відносин: сучасні тенденції // Держава і право. 2022. №58.
- Ландє Д. В. OSINT у кібербезпеці: навч. пос. – Київ: ТОВ «Інжиніринг», 2024. – 522 с.
- Мельник А. В., Кулик О. В. Використання методів машинного навчання у вебсистемах технічної підтримки користувачів. // Вісник Національного університету «Львівська політехніка». Серія: Комп'ютерні науки. - 2022. - № 4(1083). - С. 45-52.
- Нестеренко А. Адміністративно-правова протидія кібербулінгу стосовно дітей: дис. канд. юрид. наук. Львів: Львівський національний університет імені Івана Франка, 2019
- Пацурківський П.С. Публічне управління і адміністрування: теоретико-правові засади. Чернівці: Чернівецький національний університет, 2017. 356 с.
- Пєвнєв В. Я. Моделі загроз і забезпеченння цілісності інформаціії // Системи та технології – 2018. – №2 (56/1) –. С. 79- 94. DOI: https://doi.org/ 10.32836/2521-6643-2018.2-56.6
- Пилипишина І. І. Протидія кібербулінгу як забезпечення права дитини на безпеку. Науковий вісник Ужгородського національного університету. 2024
- Савчук В. О., Цуранов М. В. Аналіз засобів безпеки хмарних платформ [Analysis of cloud platform security tools]. У кн.: Проблеми інформатизації: тези доп. 8-ї міжнар. наук.-техн. конф., 26-27 листопада 2020 р., м. Черкаси, м. Харків, м. Баку, м. Бельсько-Бяла : [у 3 т.]. Т. 1 / Черк. держ. технолог. ун-т [та ін.]. – Харків : Петров В. В., 2020. – 83 с
- Харченко В.С., Стряпунін А.О. Application of AI Tools in Requirements Engineering: Analysis of Capabilities and a Chatbot for Validation // Aviation and Space Technology. – 2024. – № 3(58). – С. 48–56. DOI: https://doi.org/10.32620/aktt.2024.2.10
- Юрх Н.Г., Петченко М.В., Іванченко І.С. (2025). Аналіз методів захисту системи передавання мовної інформації. Сучасний захист інформації, 2(62), 107–113. DOI: 10.31673/2409-7292.2025.026026