{"title":"1","authors":"G. Thompson, L. Alba-Juez","doi":"10.26565/2519-2310-2020-1","DOIUrl":"https://doi.org/10.26565/2519-2310-2020-1","url":null,"abstract":"","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a voting system with using blockchain technologies in the example of Hyperledger","authors":"","doi":"10.26565/2519-2310-2019-1-05","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-1-05","url":null,"abstract":"It discusses the characteristics and features of work in the Hyperledger Fabric system and the characteristic problems of the implementation of transactions. The registers and principles of their work in the respective systems are considered, in particular, the connection of the system to voting and the check of Blockchain blocks. Defined mechanisms for the protection of relevant systems and characteristic vulnerabilities. Considered public key infrastructure in the system.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"249 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Олександр Оникійчук, Володимир Скриннік, Майдан Свободи
{"title":"Application of cryptographic algorithms in decentralized networks and prospects for their replacement for the post-quantum period","authors":"Олександр Оникійчук, Володимир Скриннік, Майдан Свободи","doi":"10.26565/2519-2310-2019-1-04","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-1-04","url":null,"abstract":"The article reviewed cryptographic algorithms that are used or can be used in decentralized networks. Algorithms for protection, both from classical and from quantum attacks are given. In the work there is a general analysis of the methods already used. Reviewed algorithms for protection, both from classical and from quantum attacks are given. The results of this work show the need for cryptographic algorithms to protect against possible quantum attacks in the future.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123623038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements for creating tools to emulate software integration processes using HTTP/HTTPS protocols","authors":"","doi":"10.26565/2519-2310-2019-2-05","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-2-05","url":null,"abstract":"Emulation of software systems integration processes using HTTP/HTTPS protocols is now widely used in the development of distributed systems software systems. The paper discusses the current state of the problem, analyzes the existing tools to solve it, identifies shortcomings, and offers a conceptual approach and program requirements that will automate and debug software development and testing processes using HTTP/HTTPS protocols.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallelization of the mathematical model of gabor filter","authors":"Serghii Rassomakhin, A. Bykov","doi":"10.26565/2519-2310-2019-2-02","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-2-02","url":null,"abstract":"Due to the acceleration of the informatization of modern society and the increase in the number of flows and objects of information that must be protected from unauthorized access, problems with the use of biometric identification technologies to differentiate access to information resources are becoming increasingly important. The paper discusses some features of fingerprint preprocessing procedures using the Gabor filter. A block diagram of a parallel model of software for fingerprint preprocessing is presented. Various technologies are also briefly considered that make it possible to organize an appropriate program (parallel processing), the advantages and disadvantages of each of them are described, on the basis of which the optimal one is selected for a specific task. The results on the speed of program execution with a different number of threads and their priority are provided.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128306711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the cross-platform Flutter framework. Will the heyday of this technology mean the disappearance of the native development on Android and iOS?","authors":"","doi":"10.26565/2519-2310-2019-2-03","DOIUrl":"https://doi.org/10.26565/2519-2310-2019-2-03","url":null,"abstract":"The work is devoted to research of the cross-platform framework for developing mobile applications Flutter from Google. A practical test of the technology was carried out to establish whether it is convenient enough and reliable. The article presents the findings of the testing. The comparison of the mechanisms of Flutter and other popular mobile cross-platform frameworks is given. The main features and differences of the technology are considered. Recommendations on its use are formulated.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128983745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of the cyberbullying phenomenon and analysis of ways to counter its manifestations","authors":"","doi":"10.26565/2519-2310-2020-1-02","DOIUrl":"https://doi.org/10.26565/2519-2310-2020-1-02","url":null,"abstract":"The main characteristics of Internet harassment (cyberbullying) are investigated in the research. The main features of this phenomenon are considered. The analysis of existing types of cyberbullying and their individual characteristics is made. The examples of legislative acts of different countries is concluded that there is deficiency of relevant rules of low. It is emphasized that anyone can become a victim of in the modern world. At the same time a risk of becoming a victim of cyberbullying does not depend on any factors (for example financial position of victim, his or her age, sex, social position etc.). It is noted that communications that are made in cyberspace provide an opportunity for users to choose information they want to make public carefully and in advance. In most cases it contributes to help people show theirs strengths (for example, when communicating in chats). In results there is often false sympathy between network interlocutors and they trust each other. So the idealization of the partner happens and any his or her information is perceived more sensitive than during direct communication. This effect is successfully used during cyberbullying, when first one person inspires the trust of another and then changes communication tactics, becoming faithless and aggressive. It is emphasized that the cyberbullying phenomenon is very underestimated and that`s why it is a serious problem. The brief overview of existing technologies and means of counteracting this phenomenon is made. The comparison of their effectiveness is made. The standards that modern and effective technology of cyberbullying resistance must meet are systematized. There are examples of successful realization of user protection in most popular social network. It is emphasized that for cyberbullying resistance nowadays in most cases the protection technologies of it is to localize undesirable content in terms of the existence of cyberbullying. Based on the results of this research it is confirmed that the cyberbullying will spread further. This is due to the constant increase in the number of users of new network services and online platforms for communication. For effective defense against cyberbullying it is required the introduction of organizational and technical measures. At the end it is proposed the general assessment of further development of cyberbullying and the ways to improve appropriate countermeasures.","PeriodicalId":194661,"journal":{"name":"Computer Science and Cybersecurity","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126931298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}