ΠΠ±ΡΡΠ½ΠΈΠΊΠΈ Π½Π°ΡΠΊΠΎΠ²ΠΈΡ ΠΏΡΠ°ΡΡ Π¦ΠΠ’Π£
Permanent URI for this communityhttps://dspace.kntu.kr.ua/handle/123456789/1
Browse
2 results
Search Results
Item type:Item, ΠΡΠ΄Π²ΠΈΡΠ΅Π½Π½Ρ Π΅ΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΡ ΡΡΠ΅Π³Π°Π½ΠΎΠ³ΡΠ°ΡΡΡΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ Π½Π° ΠΎΡΠ½ΠΎΠ²Ρ Π³Π»ΠΈΠ±ΠΎΠΊΠΈΡ Π°Π²ΡΠΎΠ΅Π½ΠΊΠΎΠ΄Π΅ΡΡΠ² Ρ ΠΊΠΎΠ½ΡΠ΅ΠΊΡΡΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΠΉΠ½ΠΎΡ Π±Π΅Π·ΠΏΠ΅ΠΊΠΈ(Π¦ΠΠ’Π£, 2025) ΠΡΠΎΠΊΠΎΠΏΠΎΠ²ΠΈΡ-Π’ΠΊΠ°ΡΠ΅Π½ΠΊΠΎ, Π. Π.; Π ΠΈΠ±Π°Π»ΡΡΠ΅Π½ΠΊΠΎ, Π. Π.; ΠΠ΅ΡΠΊΠ°Ρ, Π―. Π.; Prokopovych-Tkachenko, D.; Rybalchenko, L.; Derkach, Ya.Π ΡΡΠ°ΡΡΡ ΡΠΎΠ·Π³Π»ΡΠ΄Π°ΡΡΡΡΡ ΠΌΠΎΠΆΠ»ΠΈΠ²ΠΎΡΡΡ Π·Π°ΡΡΠΎΡΡΠ²Π°Π½Π½Ρ Π³Π»ΠΈΠ±ΠΎΠΊΠΈΡ Π°Π²ΡΠΎΠ΅Π½ΠΊΠΎΠ΄Π΅ΡΡΠ² Ρ ΡΡΠ΅ΡΡ ΠΏΡΠΈΡ ΠΎΠ²ΡΠ²Π°Π½Π½Ρ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ (ΡΡΠ΅Π³Π°Π½ΠΎΠ³ΡΠ°ΡΡΡ). ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΠΎ ΠΏΠΎΡΠ΄Π½Π°Π½Π½Ρ ΠΌΠ΅ΡΠΎΠ΄ΡΠ² ΡΡΠ΅Π³Π°Π½ΠΎΠ³ΡΠ°ΡΡΡ Π· Π³Π»ΠΈΠ±ΠΈΠ½Π½ΠΈΠΌ Π½Π°Π²ΡΠ°Π½Π½ΡΠΌ Π΄Π°Ρ Π·ΠΌΠΎΠ³Ρ ΠΏΡΠ΄Π²ΠΈΡΠΈΡΠΈ Π½Π°Π΄ΡΠΉΠ½ΡΡΡΡ ΡΠΈΡΡΠ΅ΠΌΠΈ ΡΠ° Π·Π±ΡΠ»ΡΡΠΈΡΠΈ ΠΏΡΠΎΠΏΡΡΠΊΠ½Ρ Π·Π΄Π°ΡΠ½ΡΡΡΡ ΠΊΠ°Π½Π°Π»Ρ ΠΏΠ΅ΡΠ΅Π΄Π°Π²Π°Π½Π½Ρ ΠΏΡΠΈΡ ΠΎΠ²Π°Π½ΠΈΡ Π΄Π°Π½ΠΈΡ . The article discusses the possibilities of using deep autoencoders in the field of information hiding (steganography). It is shown that the combination of steganography methods with deep learning makes it possible to improve system reliability and increase the bandwidth of the hidden data transmission channel.Item type:Item, Π’Π°ΡΠ³Π΅ΡΠΎΠ²Π°Π½Ρ Π°ΡΠ°ΠΊΠΈ Π½Π° ΡΡΠΏΡΡΠ½ΠΈΠΊΠΎΠ²Ρ ΡΠ½ΡΠ΅ΡΠ½Π΅Ρ-ΡΠΈΡΡΠ΅ΠΌΠΈ: Π²ΠΈΠΊΠ»ΠΈΠΊΠΈ ΡΠ° ΠΏΡΠ΄Ρ ΠΎΠ΄ΠΈ Π΄ΠΎ Π·Π°Ρ ΠΈΡΡΡ(Π¦ΠΠ’Π£, 2024) ΠΡΠΎΠΊΠΎΠΏΠΎΠ²ΠΈΡ-Π’ΠΊΠ°ΡΠ΅Π½ΠΊΠΎ, Π. Π.; ΠΠ²ΡΡΡΠ², Π. Π.; ΠΡΡΠΊΠΎΠ², Π. Π.; Π₯ΡΡΡΠΊΠΎΠ², Π. Π‘.; Π§Π΅ΡΠΊΠ°ΡΡΠΊΠΈΠΉ, Π. Π.; Prokopovych-Tkachenko, D.; Zverev, V.; Bushkov, V.; Khrushkov, B.; Cherkaskiy, O.Π£ ΡΡΠ°ΡΡΡ Π°Π½Π°Π»ΡΠ·ΡΡΡΡΡΡ ΠΎΠ΄Π½Π° Π· Π½Π°ΠΉΠΌΠ°ΡΡΡΠ°Π±Π½ΡΡΠΈΡ ΠΊΡΠ±Π΅ΡΠ°ΡΠ°ΠΊ, ΡΠΏΡΡΠΌΠΎΠ²Π°Π½Π° Π½Π° Π²ΠΈΠΊΠΎΡΠΈΡΡΠ°Π½Π½Ρ ΡΡΠ°Π·Π»ΠΈΠ²ΠΎΡΡΠ΅ΠΉ ΡΡΠΏΡΡΠ½ΠΈΠΊΠΎΠ²ΠΎΠ³ΠΎ ΡΠ½ΡΠ΅ΡΠ½Π΅ΡΡ Starlink, ΡΠΎ ΡΠΈΡΠΎΠΊΠΎ Π·Π°ΡΡΠΎΡΠΎΠ²ΡΡΡΡΡΡ Π΄Π»Ρ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ Π·Π²βΡΠ·ΠΊΡ Π² ΡΠΌΠΎΠ²Π°Ρ Π²ΡΠ΄ΡΡΡΠ½ΠΎΡΡΡ ΡΡΠ°Π΄ΠΈΡΡΠΉΠ½ΠΎΡ ΡΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠΈ. ΠΠ»ΠΎΠ²ΠΌΠΈΡΠ½ΠΈΠΊΠΈ, Π²ΠΈΠΊΠΎΡΠΈΡΡΠΎΠ²ΡΡΡΠΈ ΡΠΊΡΠ΄Π»ΠΈΠ²Π΅ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠ½Π΅ Π·Π°Π±Π΅Π·ΠΏΠ΅ΡΠ΅Π½Π½Ρ, Π·Π΄ΡΠΉΡΠ½ΠΈΠ»ΠΈ ΡΠ°ΡΠ³Π΅ΡΠΎΠ²Π°Π½Ρ Π°ΡΠ°ΠΊΠΈ Π½Π° ΠΏΡΠΈΡΡΡΠΎΡ, ΡΠΎ Π΄ΠΎΠ·Π²ΠΎΠ»ΠΈΠ»ΠΎ ΡΠΌ ΠΎΡΡΠΈΠΌΠ°ΡΠΈ Π΄ΠΎΡΡΡΠΏ Π΄ΠΎ ΠΊΠΎΠ½ΡΡΠ΄Π΅Π½ΡΡΠΉΠ½ΠΎΡ ΡΠ½ΡΠΎΡΠΌΠ°ΡΡΡ ΡΠ° ΠΏΠΎΡΡΡΠΈΡΠΈ ΡΠΎΠ±ΠΎΡΡ ΠΊΡΠΈΡΠΈΡΠ½ΠΈΡ ΡΠΈΡΡΠ΅ΠΌ. ΠΠ΅ΡΠ°Π»ΡΠ½ΠΎ ΠΎΠΏΠΈΡΠ°Π½ΠΎ ΠΌΠ΅ΡΠΎΠ΄ΠΈ Π°ΡΠ°ΠΊ, Π²ΠΊΠ»ΡΡΠ°ΡΡΠΈ Π²ΠΏΡΠΎΠ²Π°Π΄ΠΆΠ΅Π½Π½Ρ ΡΠΊΡΠ΄Π»ΠΈΠ²ΠΈΡ ΠΏΡΠΎΠ³ΡΠ°ΠΌ ΡΠ΅ΡΠ΅Π· PowerShell-Π΄ΡΠΎΠΏΠΏΠ΅ΡΠΈ, Π·ΠΌΡΠ½Ρ ΠΊΠΎΠ½ΡΡΠ³ΡΡΠ°ΡΡΠΉ ΠΌΠ΅ΡΠ΅ΠΆΠ΅Π²ΠΈΡ ΠΏΡΠΈΡΡΡΠΎΡΠ² ΡΠ° Π·Π±ΠΈΡΠ°Π½Π½Ρ ΡΡΡΠ»ΠΈΠ²ΠΈΡ Π΄Π°Π½ΠΈΡ . The purpose of this article is to analyze modern targeted cyberattacks on satellite internet systems, assess their impact on critical infrastructure, and develop recommendations for enhancing cybersecurity measures. The study focuses on identifying vulnerabilities within the Starlink system, widely used in remote areas and military operations. Given the increasing complexity of cyber threats, traditional protection methods prove ineffective against multi-vector attacks, emphasizing the necessity of adaptive defense mechanisms. The paper proposes an innovative approach based on emergent-adaptive neural networks, which can dynamically monitor and respond to cyber threats in real time. Furthermore, the integration of international cybersecurity standards, such as DSTU ISO/IEC 27001:2023, is considered essential for strengthening the resilience of satellite communication networks.