Implementation of Active Cybersecurity Education in Ukrainian Higher School
Cybersecurity as a part of information technology requires constant professional
development for teachers. Therefore it is indicative of the study of the implementation of …
development for teachers. Therefore it is indicative of the study of the implementation of …
Application of artificial intelligence for improving situational training of cybersecurity specialists
YV Shchavinsky, TM Muzhanova… - … and Learning Tools, 2023 - search.proquest.com
The article identifies the problem of the need for continuous development and improvement
of practical skills for cybersecurity professionals due to the constant growth and evolution of …
of practical skills for cybersecurity professionals due to the constant growth and evolution of …
[PDF][PDF] Method for Determining the Level of Criticality Elements when Ensuring the Functional Stability of the System based on Role Analysis of Elements.
The introduction of artificial intelligence technologies in the education process has become
an urgent need at the current pace of development of society. The integration of various …
an urgent need at the current pace of development of society. The integration of various …
Experimental evaluation of phishing attack on high school students
The effectiveness of phishing attacks is being analyzed by many researchers. At the same
time, researches often deal with the random sample of people suffered a phishing attack and …
time, researches often deal with the random sample of people suffered a phishing attack and …
Formation of High School Students' Resistance to Destructive Information Influences
Today, information attacks occupy a prominent place in hybrid wars and their influence and
significance are not inferior to armed aggression. Furthermore, information warfare begins …
significance are not inferior to armed aggression. Furthermore, information warfare begins …
[PDF][PDF] Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms.
A Horpenyuk, I Opirskyy, P Vorobets - CQPC, 2023 - ceur-ws.org
The paper provides an overview and analysis of the current state, problems, and prospects
of post-quantum cryptography. Considered the status of the Post-Quantum Cryptography …
of post-quantum cryptography. Considered the status of the Post-Quantum Cryptography …
Theoretical exploration of the design of the open university ecosystem and its security challenges within the realm of digital transformation
The paper investigates the theoretical foundations of designing an open university
ecosystem for protection against information security threats that meet the requirements of …
ecosystem for protection against information security threats that meet the requirements of …
Ontological Approach in Modern Educational Processes
K Tkachenko, O Tkachenko, N Mazur… - … in Information and …, 2024 - elibrary.kubg.edu.ua
It is proposed to use ontological modeling in modern learning processes (directly providing
educational content to students, organizing educational processes, managing student …
educational content to students, organizing educational processes, managing student …
[PDF][PDF] The Impact of the Covid-19 Pandemic on Students Studying in High Education Institutions.
M Nazarkevych, V Hrytsyk, A Kuza, O Shevchuk… - CPITS II (2), 2021 - ceur-ws.org
Nowadays in Ukraine, people must plan their future according to the specifics of new
relations-the new specifics of communications, labor organization etc. Each industry has …
relations-the new specifics of communications, labor organization etc. Each industry has …
[PDF][PDF] Development of Virtual Laboratories and Innovative Cybersecurity Courses for Distance Learning.
The article is devoted to develo** virtual laboratories and innovative cybersecurity
courses for distance learning due to the urgent need for effective education in the current …
courses for distance learning due to the urgent need for effective education in the current …