Skip to main content
Skip to main navigation menu
Skip to site footer
Computer Science and Cybersecurity
About
Field and Subject matter
Submissions
About the Journal
General information
Periodocity of publication
Open access policy
History of the journal
Peer review process
Publication ethics and publication malpractice statement
Payment for publication
Plagiarism check
Journal's Open Access declaration
Current
Archives
Editorial Team
Contact
Statistics
Search
Search
Register
Login
Home
/
Archives
/
No. 2 (2022)
No. 2 (2022)
Issue 2(22) 2022
DOI:
https://doi.org/10.26565/2519-2310-2022-2
Published:
2022-12-29
Full Issue
PDF (Українська)
Analysis of data search methods in cryptographically protected databases.
Teimur Makhmudov, Vitalii Yesin
6-21
pdf (Українська)
Modeling steganocontent extraction attempts with different lengths stack sampling series of images blocks
Mykyta Honcharov; Larysa Pavlova; Yulia Lesnaya
22-27
pdf
Modern threats and ways to secure web applications.
Kyrylo Yaremchuk, Denys Voskoboinykov, Olha Melkozerova
28-34
pdf (Українська)
Overview of the current state of threats caused by the influence of exploits
Yelyzaveta Bohdanova, Tetiana Chorna, Serhii Malakhov
35-40
pdf (Українська)
Comparison of commercial web application vulnerability scanners and open source scanners
Ivan Lakhtin, Dmytro Mykhailenko, Oleksii Nariezhnii
41-49
pdf (Українська)
ISSN
2519-2310
(Online)
Keywords
Make a Submission
Open Journal Systems
Language
English
Українська
A Visual Guide to
Open Journal Systems