No. 2, 2023
Year: 2023
Issue: 2
Pages: 212
10
4470

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • 2
  • 417
  • Pages: 9-16

Using botnet coordination detection to detect social information campaigns

Information security application
  • 1
  • 419
  • Pages: 17-26

Accounting for the impact of the human factor in cyber security models

Information security application
  • 1
  • 438
  • Pages: 27-36

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • 0
  • 423
  • Pages: 37-46

Analysis of decompiled program code using abstract syntax trees

Software security
  • 2
  • 194
  • Pages: 47-60

Methods of monitoring the execution of the security pattern in infocommunication systems

Network and telecommunication security
  • 0
  • 198
  • Pages: 61-72

Decentralized messaging systems architecture stability analysis

Network and telecommunication security
  • 0
  • 238
  • Pages: 73-81

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • 4
  • 246
  • Pages: 82-91

Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities

Critical information infrastructure security
  • 0
  • 201
  • Pages: 92-106

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • 0
  • 192
  • Pages: 107-122

A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity

Cyber-physic systems security
  • 0
  • 186
  • Pages: 123-139

Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things

Cyber-physic systems security
  • 0
  • 189
  • Pages: 140-149

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • 0
  • 190
  • Pages: 150-162

Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory

Cyber-physic systems security
  • 0
  • 185
  • Pages: 163-172

Method of cyberphysical system topology reconfiguration based on graph artificial neural network

Cyber-physic systems security
  • 0
  • 188
  • Pages: 173-182

Approaches to solving the problem of synthesis of an effective process of functioning of military-technical systems

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 185
  • Pages: 183-190

Artificial neural networks in the navigation safety system of autonomous unmanned vessels

Machine learning and knowledge control systems
  • 0
  • 191
  • Pages: 191-201

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • 0
  • 190
  • Pages: 202-211