{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:21:08Z","timestamp":1772263268620,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031354663","type":"print"},{"value":"9783031354670","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35467-0_32","type":"book-chapter","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:02:04Z","timestamp":1686978124000},"page":"533-551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Implementation of Active Cybersecurity Education in Ukrainian Higher School"],"prefix":"10.1007","author":[{"given":"Volodymyr","family":"Buriachok","sequence":"first","affiliation":[]},{"given":"Nataliia","family":"Korshun","sequence":"additional","affiliation":[]},{"given":"Oleksii","family":"Zhyltsov","sequence":"additional","affiliation":[]},{"given":"Volodymyr","family":"Sokolov","sequence":"additional","affiliation":[]},{"given":"Pavlo","family":"Skladannyi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"issue":"1","key":"32_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F Cohen","year":"1987","unstructured":"Cohen, F.: Computer viruses theory and experiments. Comput. Secur. 6(1), 22\u201335 (1987)","journal-title":"Comput. Secur."},{"key":"32_CR2","unstructured":"Alizar, A.: HP Information Security Report 2013. http:\/\/xakep.ru\/2014\/02\/04\/61990\/"},{"key":"32_CR3","unstructured":"McAfee LLC. McAfee Labs Threats Report. https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-dec-2018.pdf"},{"key":"32_CR4","unstructured":"International Telecommunication Union: Security in Telecommunications and Information Technology. https:\/\/www.itu.int\/dms_pub\/itu-t\/opb\/tut\/T-TUT-SEC-2015-PDF-E.pdf"},{"key":"32_CR5","unstructured":"CyberEdge Group LLC: Report Defense Cyberthreat (2018). https:\/\/cyber-edge.com\/wp-content\/uploads\/2018\/03\/CyberEdge-2018-CDR.pdf"},{"key":"32_CR6","unstructured":"World Economic Forum: The Global Risks Report. http:\/\/www3.weforum.org\/docs\/WEF_GRR18_Report.pdf"},{"key":"32_CR7","unstructured":"R-Vision: Information Security Projections for 2018. https:\/\/rvision.pro\/en\/blog-posts\/prognozy-po-informatsionnoj-bezopasnosti-na-2018-god\/"},{"key":"32_CR8","unstructured":"Euronews: Davos 2018: A Joint Response to Global Threats. https:\/\/en.euronews.com\/2018\/01\/24\/davos-2018-what-are-humanitarian-organisations-bringing-to-the-world-economic"},{"key":"32_CR9","unstructured":"Zakhmatov, V.D.: Multifaceted Protection Technique (1991)"},{"key":"32_CR10","unstructured":"Manachinsky, A.Y.: Iraq: At the Epicenter of the Wars (2015)"},{"key":"32_CR11","first-page":"15","volume":"10","author":"B Kessler","year":"2011","unstructured":"Kessler, B.: The vulnerability of nuclear facilities to cyber attack. Strateg. Insights 10, 15\u201325 (2011)","journal-title":"Strateg. Insights"},{"key":"32_CR12","unstructured":"North Atlantic Alliance: NATO-Ukraine Expert Consultations on Cyber Security. https:\/\/www.nato.int\/cps\/en\/natohq\/news_61562.htm?selectedLocale=en"},{"key":"32_CR13","unstructured":"Ukrainian News: The Undeclared War in Cyberspace (2010). http:\/\/economica.com.ua\/tele\/article\/625008.html"},{"key":"32_CR14","unstructured":"BiZUA: The 20 Biggest Cybercrimes of the 21st Century (2015). https:\/\/bizua.org\/351\/20-najguchnishix-kiberzlochiniv-xxi-stolittya"},{"key":"32_CR15","unstructured":"MITRE: Software: NetTraveler\u2014ATT & CK for Enterprise. https:\/\/attack.mitre.org\/software\/S0033"},{"key":"32_CR16","unstructured":"GReAT: Operation Red October as an Extensive Network of Cyber Espionage against Diplomatic and Governmental Structures. https:\/\/securelist.com\/the-red-october-campaign-an-advanced-cyber-espionage-network-targeting-diplomatic-and-government-agencies\/3632\/"},{"key":"32_CR17","unstructured":"Media-DC: The largest Cyber-Attacks against Ukraine Since 2014. Infographics. https:\/\/nv.ua\/eng\/ukraine\/events\/najbilshi-kiberataki-proti-ukrajini-z-2014-roku-infografika-1438924.html"},{"key":"32_CR18","unstructured":"Unian: Mass Attack of Petya A Virus: Suspected Hackers Made First Statement. https:\/\/www.unian.net\/science\/2013686-massovaya-ataka-petyaa-yakobyi-stoyaschie-za-virusom-hakeryi-sdelali-pervoe-zayavlenie.html"},{"key":"32_CR19","unstructured":"Today: WannaCry Attack: How to Protect Your Computer from a Dangerous Virus. https:\/\/www.segodnya.ua\/lifestyle\/science\/ataka-wannacry-kak-zashchitit-kompyuter-ot-opasnogo-virusa-1020872.html"},{"key":"32_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-030-39512-4_56","volume-title":"Intelligent Human Systems Integration 2020","author":"O Burov","year":"2020","unstructured":"Burov, O., et al.: Cybersecurity in educational networks. In: Ahram, T., Karwowski, W., Vergnano, A., Leali, F., Taiar, R. (eds.) IHSI 2020. AISC, vol. 1131, pp. 359\u2013364. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39512-4_56"},{"key":"32_CR21","unstructured":"Poroshenko, P.: The Law of Ukraine on Basic Principles of Cyber Security of Ukraine. https:\/\/zakon.rada.gov.ua\/laws\/show\/2163-19\/print"},{"key":"32_CR22","first-page":"5","volume":"5","author":"YG Danik","year":"2011","unstructured":"Danik, Y.G., Suprunov, Y.M.: Some approaches to formation of the training system for the cyber security system of Ukraine. Collect. Sci. Pap. Sci. Inf. Inst. Inf. Sci. Ukr. 5, 5\u201322 (2011)","journal-title":"Collect. Sci. Pap. Sci. Inf. Inst. Inf. Sci. Ukr."},{"key":"32_CR23","first-page":"12","volume":"2","author":"AI Minochkin","year":"2011","unstructured":"Minochkin, A.I.: Information struggle: Current state and expertise of expert training. Def. Bull. 2, 12\u201314 (2011)","journal-title":"Def. Bull."},{"key":"32_CR24","unstructured":"Sysoev, V.: Analysis of the level of education and training of IT and information security professionals in Ukraine, CISM (2011)"},{"key":"32_CR25","first-page":"126","volume":"20","author":"VL Buriachok","year":"2014","unstructured":"Buriachok, V.L., Bogush, V.M.: Recommendations for the development and implementation of a cyber security training profile in Ukraine. Ukr. Sci. J. Inf. Secur. 20, 126\u2013131 (2014)","journal-title":"Ukr. Sci. J. Inf. Secur."},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Hu, Z., Buriachok, V., Sokolov, V.: Implementation of social engineering attack at institution of higher education. In: International Workshop on Cyber Hygiene, pp. 155\u2013164 (2020)","DOI":"10.2139\/ssrn.3679106"},{"key":"32_CR27","first-page":"277","volume":"5","author":"V Buriachok","year":"2018","unstructured":"Buriachok, V., et al.: Model of training specialists in the field of information and cyber security in higher education institutions of Ukraine. Inf. Technol. Teach. Aids. 5, 277\u2013291 (2018)","journal-title":"Inf. Technol. Teach. Aids."},{"key":"32_CR28","unstructured":"Costigan, S.S., Hennessy, M.A.: Cybersecurity: A Generic Reference Curriculum. https:\/\/www.nato.int\/nato_static_fl2014\/assets\/pdf\/pdf_2016_10\/20161025_1610-cybersecurity-curriculum.pdf"},{"key":"32_CR29","unstructured":"National Research Council, National Science Education Standards. The National Academies Press, Washington (1996)"},{"issue":"12","key":"32_CR30","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/S1369-7021(03)01225-2","volume":"6","author":"YJ Dori","year":"2003","unstructured":"Dori, Y.J., et al.: Technology for active learning. Mater. Today 6(12), 44\u201349 (2003)","journal-title":"Mater. Today"},{"key":"32_CR31","unstructured":"Martin, J., Wackerlin, D.: CDIO as a cross-discipline academic model. In: Proceedings of the 12th International CDIO Conference, pp. 986\u20131003 (2016)"},{"key":"32_CR32","unstructured":"Buriachok, V.L., Sokolov, V.Y.: CDIO Initiative. Kyiv (2019)"},{"key":"32_CR33","unstructured":"Sokolov, V., Taj Dini, M., Buriachok, V.: Wireless and Mobile Security: Laboratory Workshop. Kyiv (2017)"},{"key":"32_CR34","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/978-3-030-16621-2_57","volume-title":"Advances in Computer Science for Engineering and Education II","author":"V Buriachok","year":"2020","unstructured":"Buriachok, V., Sokolov, V.: Implementation of active learning in the master\u2019s program on cybersecurity. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds.) ICCSEEA 2019. AISC, vol. 938, pp. 610\u2013624. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-16621-2_57"},{"key":"32_CR35","unstructured":"Sokolov, V.: Implementation of Global Active Learning Techniques in the Master\u2019s Degree Program in Cyber Security 125. http:\/\/kubg.edu.ua\/prouniversitet\/news\/podiji\/5698-vprovadzhennia-innovatsiinykh-tekhnolohii-kiberbezpeky-v-universyteti.html"},{"key":"32_CR36","unstructured":"Buriachok, V.L.: Introduction to Active Learning Technologies in Borys Grinchenko Kyiv University Educational Process. http:\/\/www.yuanshihui.cn\/detail\/8e6847e3bb1000fa66141bb2"},{"key":"32_CR37","unstructured":"Babich, O.M.: Student Action: A Student Leadership Competence Development Program. http:\/\/www.britishcouncil.org.ua\/programmes\/education\/student-action-2018"},{"key":"32_CR38","unstructured":"Buriachok, V.L.: Introduction of Practice Oriented Learning Technology in Specialty 125 \u201cCybersecurity\u201d into the University\u2019s Educational Process. http:\/\/ij.kubg.edu.ua\/pro-instytut\/news\/podiji\/943-forum-ynformatsyjna-bezpeka.html"},{"key":"32_CR39","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/978-3-030-43070-2_29","volume-title":"Data-Centric Business and Applications","author":"Z Hu","year":"2021","unstructured":"Hu, Z., Buriachok, V., Bogachuk, I., Sokolov, V., Ageyev, D.: Development and operation analysis of spectrum monitoring subsystem 2.4\u20132.5\u00a0GHz range. In: Radivilova, T., Ageyev, D., Kryvinska, N. (eds.) Data-Centric Business and Applications. LNDECT, vol. 48, pp. 675\u2013709. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-43070-2_29"},{"key":"32_CR40","doi-asserted-by":"publisher","unstructured":"Carlsson, A., et al.: Remote security labs in the cloud ReSeLa. In: IEEE Global Engineering Education Conference, pp. 1\u20138 (2015). https:\/\/doi.org\/10.1109\/educon.2015.7095971","DOI":"10.1109\/educon.2015.7095971"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Information Technology for Education, Science, and Technics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35467-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:05:58Z","timestamp":1686978358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35467-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031354663","9783031354670"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35467-0_32","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITEST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific-Practical Conference \"Information Technology for Education, Science and Technics\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cherkasy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itest2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itest.chdtu.edu.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}