No. 1, 2023
Year: 2023
Issue: 1
Pages: 148
13
6714

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • 3
  • 447
  • Pages: 9-16

Method for detecting false information from social information services using the reality parameter

Information security application
  • 0
  • 399
  • Pages: 17-25

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • 2
  • 441
  • Pages: 26-36

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • 0
  • 411
  • Pages: 37-45

Analysis of the international standard ISO 27 701 and the formation of recommendations for its use

Information security application
  • 2
  • 411
  • Pages: 46-53

Forming the culture of digital security of students of higher educational institutions of shipbuilding profile

Information security application
  • 0
  • 416
  • Pages: 54-61

Detecting source code fragments similarity with machine learning algorithms

Software security
  • 1
  • 427
  • Pages: 62-71

Decimation of M-sequences as a way to obtain primitive polynomials

Applied cryptography
  • 0
  • 417
  • Pages: 72-78

Current trends in methods of operational automation of data processing

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 406
  • Pages: 79-87

Actual problems of automation and hydrological provision of waterways in the arctic zone

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 437
  • Pages: 88-95

An approach to assessing the effectiveness of the functioning of a group of unmanned aerial vehicles in unpredictable situations

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 404
  • Pages: 96-103

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • 0
  • 413
  • Pages: 104-110

DDOS ATTACKS DETECTION BASED ON A MODULAR NEURAL NETWORK

Machine learning and knowledge control systems
  • 2
  • 421
  • Pages: 111-118

Protection against adversarial attacks on image recognition systems using an autoencoder

Machine learning and knowledge control systems
  • 3
  • 426
  • Pages: 119-127

Application of machine learning methods in the problem of searching area of interest for biometric identification based on the pattern of palm veins

Machine learning and knowledge control systems
  • 0
  • 415
  • Pages: 128-138

Criteria used to assess the quality of information security systems

Quality assessment and software systems support
  • 0
  • 423
  • Pages: 139-147