{"id":14740,"date":"2022-12-24T14:19:25","date_gmt":"2022-12-24T12:19:25","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=14740"},"modified":"2022-12-26T22:28:12","modified_gmt":"2022-12-26T20:28:12","slug":"model-potoku-tekstovyh-povidomlen-tematychnyh-internet-resursiv-systemy-prognozuvannya-informaczijnoyi-bezpeky","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=14740","title":{"rendered":"\u041c\u043e\u0434\u0435\u043b\u044c \u043f\u043e\u0442\u043e\u043a\u0443 \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u0438\u0445 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041c\u041e\u0414\u0415\u041b\u042c \u041f\u041e\u0422\u041e\u041a\u0423 \u0422\u0415\u041a\u0421\u0422\u041e\u0412\u0418\u0425 \u041f\u041e\u0412\u0406\u0414\u041e\u041c\u041b\u0415\u041d\u042c \u0422\u0415\u041c\u0410\u0422\u0418\u0427\u041d\u0418\u0425 \u0406\u041d\u0422\u0415\u0420\u041d\u0415\u0422-\u0420\u0415\u0421\u0423\u0420\u0421\u0406\u0412 \u0421\u0418\u0421\u0422\u0415\u041c\u0418 \u041f\u0420\u041e\u0413\u041d\u041e\u0417\u0423\u0412\u0410\u041d\u041d\u042f \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0419\u041d\u041e\u0407 \u0411\u0415\u0417\u041f\u0415\u041a\u0418<\/p>\n<p style=\"text-align: center;\">TEXT MESSAGE FLOW MODEL OF THEMATIC INTERNET RESOURCES INFORMATION SECURITY FORECASTING SYSTEMS<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 294-300. \u041d\u043e\u043c\u0435\u0440: \u21165, 2022 (313)\u00a0 \u00a0<\/strong> <a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2022\/12\/vknu-ts-2022-n5313-294-300.pdf\"> <img loading=\"lazy\" class=\"size-full wp-image-69 alignnone\" src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" alt=\"\" width=\"76\" height=\"32\" \/><\/a><br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2022-313-5-294-300\">https:\/\/www.doi.org\/10.31891\/2307-5732-2022-313-5-294-300<\/a><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438: <\/strong><br \/>\n\u0414\u0416\u0423\u041b\u0406\u0419 \u0412\u043e\u043b\u043e\u0434\u0438\u043c\u0438\u0440<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID <a href=\"http:\/\/orcid.org\/0000-0003-1878-4301\">http:\/\/orcid.org\/0000-0003-1878-4301<\/a><br \/>\ne-mail: dg2303@ukr.net<br \/>\n\u041f\u0415\u0422\u041b\u042f\u041a \u041d\u0430\u0442\u0430\u043b\u0456\u044f<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID <a href=\"http:\/\/orcid.org\/0000-0001-5971-4428\">http:\/\/orcid.org\/0000-0001-5971-4428<\/a><br \/>\ne-mail: npetlyak@khmnu.edu.ua<br \/>\n\u0425\u041c\u0415\u041b\u042c\u041d\u0418\u0426\u042c\u041a\u0418\u0419 \u042e\u0440\u0456\u0439<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nORCID <a href=\"http:\/\/orcid.org\/0000-0002-4005-5669\">http:\/\/orcid.org\/0000-0002-4005-5669<\/a><br \/>\ne-mail: getman-58@ukr.net,<br \/>\n\u041f\u0410\u0425\u0410\u0420 \u041e\u043b\u0435\u043a\u0441\u0430\u043d\u0434\u0440<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\ne-mail:dg2303@ukr.net<br \/>\nDZHULIY Volodymyr, PETLIAK Natalia,<br \/>\nKHMELNYTSKYI Yuri, PAKHAR Oleksandr<br \/>\nKhmelnytsky National University<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0420\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u0430 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u0437\u0430\u0434\u0430\u0447\u0430 \u043f\u043e\u0431\u0443\u0434\u043e\u0432\u0438 \u043c\u043e\u0434\u0435\u043b\u0456 \u043f\u043e\u0442\u043e\u043a\u0443 \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u0438\u0445 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0442\u0430 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u043c\u043e\u0434\u0435\u043b\u044c \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445 \u0444\u043e\u0440\u0443\u043c\u0443 \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u043e\u0433\u043e \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0440\u0435\u0441\u0443\u0440\u0441\u0443, \u0432\u0456\u0434\u0440\u0456\u0437\u043d\u044f\u0454\u0442\u044c\u0441\u044f \u0432\u0456\u0434 \u0432\u0456\u0434\u043e\u043c\u0438\u0445, \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u0456\u0441\u0442\u044e, \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0430\u043d\u0430\u043b\u0456\u0437\u0443\u0432\u0430\u0442\u0438 \u0442\u0430 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0443\u0432\u0430\u0442\u0438 \u043f\u043e\u0442\u0456\u043a \u0434\u0430\u043d\u0438\u0445 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0444\u043e\u0440\u0443\u043c\u0456\u0432, \u0440\u0435\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u0438\u0445 \u043d\u0430 \u0431\u0430\u0437\u0456 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0438\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c \u0434\u043b\u044f \u0440\u043e\u0437\u0440\u043e\u0431\u043a\u0438 \u0434\u0438\u0441\u043a\u0443\u0441\u0456\u0439\u043d\u0438\u0445 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432. \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u043f\u043e\u0442\u043e\u043a\u0443 \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u0438\u0445 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0444\u043e\u0440\u0443\u043c\u0456\u0432, \u0432\u0456\u0434\u0440\u0456\u0437\u043d\u044f\u0454\u0442\u044c\u0441\u044f \u0432\u0456\u0434 \u0432\u0456\u0434\u043e\u043c\u0438\u0445, \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044e \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u0438 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0438\u0439 \u0430\u043d\u0430\u043b\u0456\u0437 \u0442\u0430 \u0441\u0435\u043c\u0430\u043d\u0442\u0438\u0447\u043d\u0443 \u0444\u0456\u043b\u044c\u0442\u0440\u0430\u0446\u0456\u044e \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c, \u0432\u0440\u0430\u0445\u043e\u0432\u0443\u044e\u0447\u0438 \u043d\u0430\u043b\u0435\u0436\u043d\u0456\u0441\u0442\u044c \u0434\u043e \u0430\u0432\u0442\u043e\u0440\u0430, \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u0443 \u0430\u0432\u0442\u043e\u0440\u0430, \u0444\u043e\u0440\u0443\u043c\u0443, \u0447\u0430\u0441\u0443 \u0441\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f, \u043a\u0456\u043b\u044c\u043a\u043e\u0441\u0442\u0456 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c, \u0442\u0435\u043c\u0456 \u0444\u043e\u0440\u0443\u043c\u0443, \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u0437\u0434\u0456\u0439\u0441\u043d\u044e\u0432\u0430\u0442\u0438 \u0430\u043d\u0430\u043b\u0456\u0437 \u0442\u0430 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u0438\u0445 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0438\u0445 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442- \u0440\u0435\u0441\u0443\u0440\u0441\u0456\u0432.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u043c\u043e\u0434\u0435\u043b\u0456, \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438, \u043c\u043e\u0434\u0435\u043b\u044c \u043f\u043e\u0442\u043e\u043a\u0443 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c, \u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0456 \u0444\u043e\u0440\u0443\u043c\u0438, \u0434\u0436\u0435\u0440\u0435\u043b\u0430 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u044c.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u00a0\u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The tasks of analysis and classification of detection of existing mechanisms for the implementation of attacks and threats to information security, which can lead to unauthorized access to confidential information, disruption of the functioning of information systems, are relevant and prioritized at the current stage. The importance of the problems is connected with the following main factors: growth of variety and quantity of means of computer technology and spheres of human activity; a high level of trust in information and search systems for data processing and management; the growth of the number of users of the information space of interaction; accumulation of large volumes of various types of information, intensive exchange of data flow in the network between users, using a wide range of access mechanisms to confidential resources, information processes; industrial espionage and competitive struggle in the sphere of information services of society; insufficient number at the present stage of highly qualified specialists in the field of information security, market relations in the field of software development, maintenance, distribution, production of computing equipment for the implementation of information security.<br \/>\nThe presented model of the flow of text messages of thematic Internet resources of the information security forecasting system and the information model of the forum database of the thematic Internet resource, which differs from the known ones in its universality, allows to analyze and study the data flow of Internet forums implemented on the basis of popular software platforms for the development of discussion information thematic resources The model of the flow of text messages of thematic Internet forums allows statistical analysis and semantic filtering of messages, taking into account authorship, author rating, forum, time of creation, number of messages, forum topic, allows analysis and research of text messages of thematic Internet resources.<br \/>\nSolving the set tasks will allow: to improve the quality of decisions made in the process of identifying and counteracting malicious information; sort information objects of influence for the operator by priority; set the input data settings of the system of detection and countermeasures against the spread of malicious information in networks.<br \/>\n<strong>Keywords:<\/strong> models, algorithms, message flow model, thematic forums, message sources.<\/p>\n<p style=\"text-align: center;\"><strong>\u041b\u0456\u0442\u0435\u0440\u0442\u0443\u0440\u0430<\/strong><\/p>\n<ol>\n<li>\u041b\u0435\u043d\u043a\u043e\u0432, \u0421.\u0412. \u041c\u043e\u0434\u0435\u043b\u044c \u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u043f\u043e\u0448\u0438\u0440\u0435\u043d\u043d\u044f \u0437\u0430\u0431\u043e\u0440\u043e\u043d\u0435\u043d\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0439\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445 \/ \u0421.\u0412. \u041b\u0435\u043d\u043a\u043e\u0432, \u0412.\u041c. \u0414\u0436\u0443\u043b\u0456\u0439, \u0412.\u0421. \u041e\u0440\u043b\u0435\u043d\u043a\u043e, \u041e.\u0412. \u0421\u0454\u043b\u044e\u043a\u043e\u0432, \u0410.\u0412. \u0410\u0442\u0430\u043c\u0430\u043d\u044e\u043a \/\/ \u0417\u0431\u0456\u0440\u043d\u0438\u043a \u043d\u0430\u0443\u043a\u043e\u0432\u0438\u0445 \u043f\u0440\u0430\u0446\u044c \u0412\u0456\u0439\u0441\u044c\u043a\u043e\u0432\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442\u0443 \u041a\u0438\u0457\u0432\u0441\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u0456\u043c\u0435\u043d\u0456 \u0422\u0430\u0440\u0430\u0441\u0430 \u0428\u0435\u0432\u0447\u0435\u043d\u043a\u0430. \u2013 \u041a.: \u0412\u0406\u041a\u041d\u0423, 2020. \u2013 \u0412\u0438\u043f. \u211668. \u2013 C. 53-64.<\/li>\n<li>\u0414\u0436\u0443\u043b\u0456\u0439 \u0412.\u041c. \u0406\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e-\u043e\u0437\u043d\u0430\u043a\u043e\u0432\u0430 \u043c\u043e\u0434\u0435\u043b\u044c \u0434\u0436\u0435\u0440\u0435\u043b\u0430 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0457 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0441\u043e\u0446\u0456\u0430\u043b\u044c\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445\/ \u0412.\u041c. \u0414\u0436\u0443\u043b\u0456\u0439 \u0406.\u0412. \u041c\u0443\u043b\u044f\u0440 \u041e.\u041e \u0417\u0430\u0446\u0435\u043f\u0456\u043d\u0430 \u0412. \u041c. \u041f\u0456\u0447\u0443\u0440\u0430 \u2013 \u0412\u0438\u043c\u0456-\u0440\u044e\u0432\u0430\u043b\u044c\u043d\u0430 \u0442\u0430 \u043e\u0431\u0447\u0438\u0441\u043b\u044e\u0432\u0430\u043b\u044c\u043d\u0430 \u0442\u0435\u0445\u043d\u0456\u043a\u0430 \u0432 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0447\u043d\u0438\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0430\u0445 \u2116 3 (2022)- 73 \u2013 78<\/li>\n<li>\u041b\u0435\u043d\u043a\u043e\u0432, \u0421.\u0412. \u041c\u0435\u0442\u043e\u0434\u044b \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u0412 2-\u0445 \u0442\u043e\u043c\u0430\u0445 \/\u0421.\u0412. \u041b\u0435\u043d\u043a\u043e\u0432, \u0414.\u0410. \u041f\u0435\u0440\u0435\u0433\u0443\u0434\u043e\u0432, \u0412.\u0410. \u0425\u043e\u0440\u043e\u0448\u043a\u043e \u2013\u041a: \u0410\u0440\u0438\u0439, 2008.\u2013464c<\/li>\n<li>\u041e\u0441\u0442\u0430\u043f\u043e\u0432 \u0421. \u0415. \u0422\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457: \u043d\u0430\u0432\u0447\u0430\u043b\u044c\u043d\u0438\u0439 \u043f\u043e\u0441\u0456\u0431\u043d\u0438\u043a \/ \u0421.\u0415. \u041e\u0441\u0442\u0430\u043f\u043e\u0432, \u0421.\u041f. \u0404\u0432\u0441\u0435\u0454\u0432, \u041e.\u0413. \u041a\u043e\u0440\u043e\u043b\u044c\u2013\u0425\u0430\u0440\u043a\u0456\u0432 : \u0412\u0438\u0434-\u0432\u043e \u0425\u041d\u0415\u0423, 2016. \u2013 476 \u0441.<\/li>\n<li>\u041b\u0454\u043d\u043a\u043e\u0432, \u0421.\u0412. \u0410\u043d\u0430\u043b\u0456\u0437 \u0456\u0441\u043d\u0443\u044e\u0447\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0442\u0430 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0456\u0432 \u0432\u0438\u044f\u0432\u043b\u0435\u043d\u043d\u044f \u0430\u0442\u0430\u043a \u0432 \u0431\u0435\u0437\u0434\u0440\u043e\u0442\u043e\u0432\u0438\u0445 \u043c\u0435\u0440\u0435\u0436\u0430\u0445 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0456 \u0434\u0430\u043d\u0438\u0445 \/ \u0421.\u0412. \u041b\u0454\u043d\u043a\u043e\u0432, \u0412.\u041c. \u0414\u0436\u0443\u043b\u0456\u0439, \u041d.\u041c. \u0411\u0435\u0440\u043d\u0430\u0437, \u0421.\u041e. \u0411\u043e\u0436\u0443\u043a \/\/ \u0417\u0431\u0456\u0440\u043d\u0438\u043a \u043d\u0430\u0443\u043a\u043e\u0432\u0438\u0445 \u043f\u0440\u0430\u0446\u044c \u0412\u0456\u0439\u0441\u044c\u043a\u043e\u0432\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442\u0443 \u041a\u0438\u0457\u0432\u0441\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u0456\u043c\u0435\u043d\u0456 \u0422\u0430\u0440\u0430\u0441\u0430 \u0428\u0435\u0432\u0447\u0435\u043d\u043a\u0430. \u2013 \u041a.: \u0412\u0406\u041a\u041d\u0423, 2017. \u2013 \u0412\u0438\u043f. \u2116 56. \u2013 C.124-132<\/li>\n<li>\u0414\u043e\u0432\u0433\u0438\u0439, \u0421.\u041e. \u0421\u0443\u0447\u0430\u0441\u043d\u0456 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u0443\u043d\u0456\u043a\u0430\u0446\u0456\u0457: \u043c\u0435\u0440\u0435\u0436\u0456, \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0456\u0457, \u0435\u043a\u043e\u043d\u043e\u043c\u0456\u043a\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f, \u0440\u0435\u0433\u0443\u043b\u044e\u0432\u0430\u043d\u043d\u044f \/ \u0421.\u041e. \u0414\u043e\u0432\u0433\u0438\u0439, \u041e.\u042f. \u0421\u0430\u0432\u0447\u0435\u043d\u043a\u043e, \u041f.\u041f. \u0412\u043e\u0440\u043e\u0431\u0456\u0454\u043d\u043a\u043e \u2013 \u041a.: \u0423\u043a\u0440\u0430\u0457\u043d\u0441\u044c\u043a\u0438\u0439 \u0412\u0438\u0434\u0430\u0442\u043d\u0438\u0447\u0456\u0439 \u0426\u0435\u043d\u0442\u0440, 2012. \u2013 520 \u0441.<\/li>\n<li>\u0414\u0436\u0443\u043b\u0456\u0439, \u0412.\u041c. \u041c\u043e\u0434\u0435\u043b\u044c \u043e\u0446\u0456\u043d\u043a\u0438 \u0439\u043c\u043e\u0432\u0456\u0440\u043d\u0456\u0441\u043d\u043e-\u0447\u0430\u0441\u043e\u0432\u0438\u0445 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0438\u0441\u0442\u0438\u043a \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0439\u043d\u043e\u0457 \u0432\u0437\u0430\u0454\u043c\u043e\u0434\u0456\u0457 \u0432 \u043c\u0435\u0440\u0435\u0436\u0456 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0440\u0435\u0447\u0435\u0439 \/ \u0412.\u041c. \u0414\u0436\u0443\u043b\u0456\u0439, \u0406.\u0412. \u041c\u0443\u043b\u044f\u0440, \u041e.\u0412. \u0421\u0454\u043b\u044e\u043a\u043e\u0432, \u0411.\u041c. \u041a\u0456\u0437\u044e\u043d \/\/ \u0417\u0431\u0456\u0440\u043d\u0438\u043a \u043d\u0430\u0443\u043a\u043e\u0432\u0438\u0445 \u043f\u0440\u0430\u0446\u044c \u0412\u0456\u0439\u0441\u044c\u043a\u043e\u0432\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442\u0443 \u041a\u0438\u0457\u0432\u0441\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u0456\u043c\u0435\u043d\u0456 \u0422\u0430\u0440\u0430\u0441\u0430 \u0428\u0435\u0432\u0447\u0435\u043d\u043a\u0430. \u2013 \u041a.: \u0412\u0406\u041a\u041d\u0423, 2019. \u2013 \u0412\u0438\u043f. \u2116 63. \u2013 C.96-106<\/li>\n<li>\u0414\u0436\u0443\u043b\u0456\u0439, \u0412.\u041c., \u041a\u043b\u044c\u043e\u0446 \u042e.\u041f., \u041c\u0443\u043b\u044f\u0440 \u0406.\u0412., \u0416\u0438\u043b\u0435\u0432\u0438\u0447 \u041c.\u041b., \u0414\u0436\u0443\u043b\u0456\u0439 \u0410.\u0412. \u041a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0456\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0442\u0440\u0430\u0444\u0456\u043a\u0430 \u043a\u043e\u043c\u043f\u2019\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436 \u043c\u0435\u0442\u043e\u0434\u0430\u043c\u0438 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f. \u0412\u0456\u0441\u043d\u0438\u043a \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443. \u0422\u0435\u0445\u043d\u0456\u0447\u043d\u0456 \u043d\u0430\u0443\u043a\u0438. 2021. \u2116 5. \u0421. 22-26.<\/li>\n<li>\u0414\u0436\u0443\u043b\u0456\u0439, \u0412.\u041c. \u041c\u0435\u0442\u043e\u0434 \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0434\u043e\u0434\u0430\u0442\u043a\u0456\u0432 \u0442\u0440\u0430\u0444\u0456\u043a\u0430 \u043a\u043e\u043c\u043f&#8217;\u044e\u0442\u0435\u0440\u043d\u0438\u0445 \u043c\u0435\u0440\u0435\u0436 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u043c\u0430\u0448\u0438\u043d\u043d\u043e\u0433\u043e \u043d\u0430\u0432\u0447\u0430\u043d\u043d\u044f \u0432 \u0443\u043c\u043e\u0432\u0430\u0445 \u043d\u0435\u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043e\u0441\u0442\u0456 \/ \u0412.\u041c. \u0414\u0436\u0443\u043b\u0456\u0439, \u041e.\u0412. \u041c\u0456\u0440\u043e\u0448\u043d\u0456\u0447\u0435\u043d\u043a\u043e, \u041b.\u0412. \u0421\u043e\u043b\u043e\u0434\u0454\u0454\u0432\u0430 \/\/ \u0417\u0431\u0456\u0440\u043d\u0438\u043a \u043d\u0430\u0443\u043a\u043e\u0432\u0438\u0445 \u043f\u0440\u0430\u0446\u044c \u0412\u0456\u0439\u0441\u044c\u043a\u043e\u0432\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0438\u0442\u0443\u0442\u0443 \u041a\u0438\u0457\u0432\u0441\u044c\u043a\u043e\u0433\u043e \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443 \u0456\u043c\u0435\u043d\u0456 \u0422\u0430\u0440\u0430\u0441\u0430 \u0428\u0435\u0432\u0447\u0435\u043d\u043a\u0430. \u2013 \u041a.: \u0412\u0406\u041a\u041d\u0423, 2022. \u2013 \u0412\u0438\u043f. \u211674. \u2013 C. 73-82.<\/li>\n<li>\u041b\u0430\u0432\u0440\u043e\u0432, \u0404. \u0410. \u041c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u0456 \u043c\u0435\u0442\u043e\u0434\u0438 \u0434\u043e\u0441\u043b\u0456\u0434\u0436\u0435\u043d\u043d\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0456\u0439: \u043f\u0456\u0434\u0440\u0443\u0447\u043d\u0438\u043a \/ \u0404. \u0410. \u041b\u0430\u0432\u0440\u043e\u0432, \u041b. \u041f. \u041f\u0435\u0440\u0445\u0443\u043d, \u0412. \u0412. \u0428\u0435\u043d\u0434\u0440\u0438\u043a \u2013 \u0421\u0443\u043c\u0438 : \u0421\u0443\u043c\u0441\u044c\u043a\u0438\u0439 \u0434\u0435\u0440\u0436\u0430\u0432\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442, 2017. \u2013 212 \u0441.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><strong>\u00a0References<\/strong><\/p>\n<ol>\n<li>Lenkov, S.V. (2020), Model bezpeky poshyrennia zaboronenoi informatsii v informatsiino-telekomunikatsiinykh merezhakh \/ S.V. Lenkov, V.M. Dzhulii, V.S. ORLENKO, O.V. Sieliukov, A.V. Atamaniuk \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka. \u2013 K.: VIKNU. \u2013 \u211668. \u2013 pp. 53-64.<\/li>\n<li>Dzhulii V.M. Informatsiino-oznakova model dzherela shkidlyvoi informatsii v sotsialnykh merezhakh\/ V.M. Dzhulii I.V. Muliar O.O Zatsepina V. M. Pichura \u2013 Vymi-riuvalna ta obchysliuvalna tekhnika v tekhnolohichnykh protsesakh \u2116 3 (2022)- 73 \u2013 78<\/li>\n<li>Lenkov, S.V. (2008), Metodyy sredstva zashchyt\u044b ynformatsyy. V 2-kh tomakh \/ S.V. Lenkov, D.A. Perehudov, V.A. Khoroshko \u2013K: Aryi\u2013464s.<\/li>\n<li>Ostapov, S. E. (2016) Tekhnolohii zakhystu informatsii: navchalnyi posibnyk \/ S.E. Ostapov, S.P. Yevseiev, O.H. Korol\u2013Kharkiv : Vyd-vo KhNEU. \u2013 476 s.<\/li>\n<li>Lenkov, S.V. (2017), AnalIz Isnuyuchih metodiv ta algoritmiv viyavlennya atak v bezdrotovih merezhah peredachI danih \/ S.V. Lenkov, V.M. Dzhuliy, N.M. Bernaz, S.O. Bozhuk \/\/ Zbirnik naukovih prats Viyskovogo Institutu Kiyivskogo natsionalnogo universitetu imeni Tarasa Shevchenka. \u2013 K.: VIKNU. \u2013 Vip. No 56. \u2013 p.124-132<\/li>\n<li>Dovhyi, S.O. (2012), Suchasni telekomunikatsii: merezhi, tekhnolohii, ekonomika, upravlinnia, rehuliuvannia \/S.O. Dovhyi, O.I. Savchenko, P.P. Vorobiienko \u2013 K.: Ukrainskyi Vydatnychii Tsentr. \u2013 520p.<\/li>\n<li>Dzhulii, V.M. (2019), Model otsinky ymovirnisno-chasovykh kharakterystyk informatsiinoi vzaiemodii v merezhi internet rechei \/ V.M. Dzhulii, I.V. Muliar, O.V. Sieliukov, B.M. Kiziun \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka. \u2013 K.: VIKNU. \u2013 Vyp. \u2116 63. \u2013 p.96-106<\/li>\n<li>Dzhulii V.M., Klots Yu.P., Muliar I.V., Zhylevych M.L., Dzhulii A.V. (2021), Kontrol dodatkiv internet-trafika kompiuternykh merezh metodamy mashynnoho navchannia. Visnyk Khmelnytskoho natsionalnoho universytetu. Tekhnichni nauky. \u2013 Khmelnytskyi. \u2013 \u21165. \u2013 pp. 22\u201326.<\/li>\n<li>Dzhulii, V.M. (2022), Metod klasyfikatsii dodatkiv trafika kompiuternykh merezh na osnovi mashynnoho navchannia v umovakh nevyznachenosti \/ V.M. Dzhulii, O.V. Miroshnichenko, L.V. Solodieieva \/\/ Zbirnyk naukovykh prats Viiskovoho instytutu Kyivskoho natsionalnoho universytetu imeni Tarasa Shevchenka. \u2013 K.: VIKNU. \u2013 Vyp. \u211674. \u2013 pp. 73-82.<\/li>\n<li>Lavrov, Ye. A. (2017.), Matematychni metody doslidzhennia operatsii : pidruchnyk \/ Ye. A. Lavrov, L. P. Perkhun, V. V. Shendryk \u2013 Sumy : Sumskyi derzhavnyi universytet, \u2013 212 p.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[71],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/14740"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14740"}],"version-history":[{"count":4,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/14740\/revisions"}],"predecessor-version":[{"id":15045,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/14740\/revisions\/15045"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}