No. 1, 2023
Year: 2023
Issue: 1
Pages: 148
10
3308

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • 1
  • 215
  • Pages: 9-17

Method for detecting false information from social information services using the reality parameter

Information security application
  • 0
  • 198
  • Pages: 17-25

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • 2
  • 212
  • Pages: 25-36

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • 0
  • 202
  • Pages: 37-45

Analysis of the international standard ISO 27 701 and the formation of recommendations for its use

Information security application
  • 2
  • 207
  • Pages: 45-53

Forming the culture of digital security of students of higher educational institutions of shipbuilding profile

Information security application
  • 0
  • 207
  • Pages: 54-61

Detecting source code fragments similarity with machine learning algorithms

Software security
  • 1
  • 209
  • Pages: 62-71

Decimation of M-sequences as a way to obtain primitive polynomials

Applied cryptography
  • 0
  • 204
  • Pages: 72-78

Current trends in methods of operational automation of data processing

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 206
  • Pages: 79-87

Actual problems of automation and hydrological provision of waterways in the arctic zone

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 203
  • Pages: 89-95

An approach to assessing the effectiveness of the functioning of a group of unmanned aerial vehicles in unpredictable situations

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 202
  • Pages: 96-103

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • 0
  • 209
  • Pages: 104-110

DDOS ATTACKS DETECTION BASED ON A MODULAR NEURAL NETWORK

Machine learning and knowledge control systems
  • 2
  • 211
  • Pages: 111-118

PROTECTION AGAINST ADVERSARIAL ATTACKS ON IMAGE RECOGNITION SYSTEMS USING AN AUTOENCODER

Machine learning and knowledge control systems
  • 2
  • 213
  • Pages: 119-127

APPLICATION OF MACHINE LEARNING METHODS IN THE PROBLEM OF SEARCHING AREA OF INTEREST FOR BIOMETRIC IDENTIFICATION BASED ON THE PATTERN OF PALM VEINS

Machine learning and knowledge control systems
  • 0
  • 203
  • Pages: 128-138

CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS

Quality assessment and software systems support
  • 0
  • 207
  • Pages: 139-147