Skip to main content Skip to main navigation menu Skip to site footer
Computer Science and Cybersecurity
  • About
    • Field and Subject matter
    • Submissions
  • About the Journal
    • General information
    • Periodocity of publication
    • Open access policy
    • History of the journal
    • Peer review process
    • Publication ethics and publication malpractice statement
    • Payment for publication
    • Plagiarism check
    • Journal's Open Access declaration
  • Current
  • Archives
  • Editorial Team
  • Contact
  • Statistics
Search
  • Register
  • Login
  1. Home /
  2. Archives /
  3. No. 2 (2022)

No. 2 (2022)

Issue 2(22) 2022

DOI: https://doi.org/10.26565/2519-2310-2022-2
Published: 2022-12-29

Full Issue

  • PDF (Українська)
  • Cover Image
    Analysis of data search methods in cryptographically protected databases.
    Teimur Makhmudov, Vitalii Yesin
    6-21
    • pdf (Українська)
  • Cover Image
    Modeling steganocontent extraction attempts with different lengths stack sampling series of images blocks
    Mykyta Honcharov; Larysa Pavlova; Yulia Lesnaya
    22-27
    • pdf
  • Cover Image
    Modern threats and ways to secure web applications.
    Kyrylo Yaremchuk, Denys Voskoboinykov, Olha Melkozerova
    28-34
    • pdf (Українська)
  • Cover Image
    Overview of the current state of threats caused by the influence of exploits
    Yelyzaveta Bohdanova, Tetiana Chorna, Serhii Malakhov
    35-40
    • pdf (Українська)
  • Cover Image
    Comparison of commercial web application vulnerability scanners and open source scanners
    Ivan Lakhtin, Dmytro Mykhailenko, Oleksii Nariezhnii
    41-49
    • pdf (Українська)
  • ISSN 2519-2310 (Online)
Keywords
Make a Submission
Open Journal Systems
Language
  • English
  • Українська
  • A Visual Guide to
    Open Journal Systems

About this Publishing System