No. 2, 2023
Year: 2023
Issue: 2
Pages: 212
16
7604
Publication schedule
  • №1 March 2026

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • 2
  • 581
  • Pages: 9-16

Using botnet coordination detection to detect social information campaigns

Information security application
  • 1
  • 577
  • Pages: 17-26

Accounting for the impact of the human factor in cyber security models

Information security application
  • 3
  • 619
  • Pages: 27-36

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • 0
  • 581
  • Pages: 37-46

Analysis of decompiled program code using abstract syntax trees

Software security
  • 2
  • 378
  • Pages: 47-60

Methods of monitoring the execution of the security pattern in infocommunication systems

Network and telecommunication security
  • 0
  • 370
  • Pages: 61-72

Decentralized messaging systems architecture stability analysis

Network and telecommunication security
  • 0
  • 444
  • Pages: 73-81

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • 5
  • 459
  • Pages: 82-91

Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities

Critical information infrastructure security
  • 0
  • 394
  • Pages: 92-106

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • 0
  • 356
  • Pages: 107-122

A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity

Cyber-physic systems security
  • 0
  • 354
  • Pages: 123-139

Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things

Cyber-physic systems security
  • 0
  • 354
  • Pages: 140-149

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • 1
  • 358
  • Pages: 150-162

Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory

Cyber-physic systems security
  • 0
  • 349
  • Pages: 163-172

Method of cyberphysical system topology reconfiguration based on graph artificial neural network

Cyber-physic systems security
  • 0
  • 368
  • Pages: 173-182

Approaches to solving the problem of synthesis of an effective process of functioning of military-technical systems

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 353
  • Pages: 183-190

Artificial neural networks in the navigation safety system of autonomous unmanned vessels

Machine learning and knowledge control systems
  • 1
  • 346
  • Pages: 191-201

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • 1
  • 363
  • Pages: 202-211