Skip to main content
Skip to main navigation menu
Skip to site footer
Computer Science and Cybersecurity
Current
Archives
Submissions
Editorial Team
Contact
Statistics
About
About the Journal
Search
Search
Register
Login
Home
/
Archives
/
No. 2 (2022)
No. 2 (2022)
Issue 2(22) 2022
DOI:
https://doi.org/10.26565/2519-2310-2022-2
Published:
2022-12-29
Full Issue
PDF (Українська)
Статті
Analysis of data search methods in cryptographically protected databases.
Teimur Makhmudov, Vitalii Yesin
6-21
pdf (Українська)
Modeling steganocontent extraction attempts with different lengths stack sampling series of images blocks
Mykyta Honcharov; Larysa Pavlova; Yulia Lesnaya
22-27
pdf
Modern threats and ways to secure web applications.
Kyrylo Yaremchuk, Denys Voskoboinykov, Olha Melkozerova
28-34
pdf (Українська)
Overview of the current state of threats caused by the influence of exploits
Yelyzaveta Bohdanova, Tetiana Chorna, Serhii Malakhov
35-40
pdf (Українська)
Comparison of commercial web application vulnerability scanners and open source scanners
Dmytro Mykhailenko, Oleksii Nariezhnii
41-49
pdf (Українська)
ISSN
2519-2310
(Online)
Keywords
Make a Submission
Open Journal Systems
Language
English
Українська
A Visual Guide to
Open Journal Systems