Tеtiana Babenko
YOU?
Author Swipe
Automated OSINT Techniques for Digital Asset Discovery and Cyber Risk Assessment Open
Cyber threats are becoming increasingly sophisticated, especially in distributed infrastructures where systems are deeply interconnected. To address this, we developed a framework that automates how organizations discover their digital ass…
A Hybrid Approach Using Graph Neural Networks and LSTM for Attack Vector Reconstruction Open
The escalating complexity of cyberattacks necessitates advanced strategies for their detection and mitigation. This study presents a hybrid model that integrates Graph Neural Networks (GNNs) with Long Short-Term Memory (LSTM) networks to r…
Risk Assessment of Cryptojacking Attacks on Endpoint Systems: Threats to Sustainable Digital Agriculture Open
Digital agriculture has rapidly developed in the last decade in many countries where the share of agricultural production is a significant part of the total volume of gross production. Digital agroecosystems are developed using a variety o…
Cyber Security Risk Modeling in Distributed Information Systems Open
This paper deals with problems of the development and security of distributed information systems. It explores the challenges of risk modeling in such systems and suggests a risk-modeling approach that is responsive to the requirements of …
INTELLIGENT MODEL FOR CLASSIFYING NETWORK CYBERSECURITY EVENTS Open
Due to the increased complexity of modern computer attacks, there is a need for security professionals not only to detect harmful activity but also to determine the appropriate steps that an attacker will go through when performing an atta…
The Main Factors Influencing the Socialization of Students in PostPandemic Period Open
Successful reform of the higher education system in the context of COVID-19, both in a single country and in the world in the context of its development toward democratization, requires updated approaches to assessing the results of social…
FORMATION OF RESEARCH COMPETENCE OF STUDENTSMEDICAL COLLEGE IN THE FORMAT OF DISTANCE LEARNING Open
The article considers the priority of formation of research competence of medical college students, with emphasis on the problems of distance learning. The author summarizes and supplements such key concepts as "competence", "research comp…
The concept of the internet of things from the view of information security Open
Анотація.IoT охоплює широкий спектр процесів: обчислення, спілкування, час та дані.Яким чином ці функції функціонують як єдина система при використанні комерційно доступних компонентів, які можна придбати з будь-якого місця і за низькою ці…
Basic rules of modern digital hygiene Open
Анотація.Цифрова гігієна часто порівнюється з особистою гігієною.Подібно до того, як людина бере участь у певних практиках особистої гігієни, щоб підтримувати власне здоров'я та самопочуття, практики з цифрової гігієни можуть зберігати дан…
SECURE SOFTWARE DEVELOPING RECOMMENDATIONS Open
Шкідливий вплив на інформацію в процесі функціонування комп'ютерних систем різного призначення здійснюється з метою порушення конфіденційності, цілісності і доступності і є можливим внаслідок експлуатації наявних вразливостей. Результатом …
Usage issues of SSL/TLS issues Open
One of the means of creating a secure communication ses-sion is using the SSL/TLS cryptographic protocol, how-ever it does not guarantee full protection and also has its own vulnerabilities and disadvantages, which must be ana-lyzed and el…