Implementation of Active Cybersecurity Education in Ukrainian Higher School

V Buriachok, N Korshun, O Zhyltsov, V Sokolov… - … for Education, Science …, 2022 - Springer
Cybersecurity as a part of information technology requires constant professional
development for teachers. Therefore it is indicative of the study of the implementation of …

Application of artificial intelligence for improving situational training of cybersecurity specialists

YV Shchavinsky, TM Muzhanova… - … and Learning Tools, 2023 - search.proquest.com
The article identifies the problem of the need for continuous development and improvement
of practical skills for cybersecurity professionals due to the constant growth and evolution of …

[PDF][PDF] Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements.

H Hnatiienko, V Hnatiienko, R Zulunov, T Babenko… - CPITS, 2024 - ceur-ws.org
The introduction of artificial intelligence technologies in the education process has become
an urgent need at the current pace of development of society. The integration of various …

Experimental evaluation of phishing attack on high school students

R Marusenko, V Sokolov, V Buriachok - International Conference on …, 2020 - Springer
The effectiveness of phishing attacks is being analyzed by many researchers. At the same
time, researches often deal with the random sample of people suffered a phishing attack and …

Formation of High School Students' Resistance to Destructive Information Influences

M Astafieva, D Bodnenko, O Lytvyn… - … in Information and …, 2023 - elibrary.kubg.edu.ua
Today, information attacks occupy a prominent place in hybrid wars and their influence and
significance are not inferior to armed aggression. Furthermore, information warfare begins …

[PDF][PDF] Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms.

A Horpenyuk, I Opirskyy, P Vorobets - CQPC, 2023 - ceur-ws.org
The paper provides an overview and analysis of the current state, problems, and prospects
of post-quantum cryptography. Considered the status of the Post-Quantum Cryptography …

Theoretical exploration of the design of the open university ecosystem and its security challenges within the realm of digital transformation

O Buinytska, V Smirnova, T Terletska… - CPITS-II 2024 …, 2024 - elibrary.kubg.edu.ua
The paper investigates the theoretical foundations of designing an open university
ecosystem for protection against information security threats that meet the requirements of …

Ontological Approach in Modern Educational Processes

K Tkachenko, O Tkachenko, N Mazur… - … in Information and …, 2024 - elibrary.kubg.edu.ua
It is proposed to use ontological modeling in modern learning processes (directly providing
educational content to students, organizing educational processes, managing student …

[PDF][PDF] The Impact of the Covid-19 Pandemic on Students Studying in High Education Institutions.

M Nazarkevych, V Hrytsyk, A Kuza, O Shevchuk… - CPITS II (2), 2021 - ceur-ws.org
Nowadays in Ukraine, people must plan their future according to the specifics of new
relations-the new specifics of communications, labor organization etc. Each industry has …

[PDF][PDF] Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning.

O Lemeshko, O Yeremenko, M Yevdokymenko… - CPITS II (2), 2021 - ceur-ws.org
The article is devoted to develo** virtual laboratories and innovative cybersecurity
courses for distance learning due to the urgent need for effective education in the current …