No. 4, 2023
Year: 2023
Issue: 4
Pages: 191
8
2104

Substantiation of the rational composition of the information security system

Information security aspects
  • 0
  • 141
  • Pages: 9-18

Analysis of cyber threat intelligence information exchange systems

Information security application
  • 0
  • 140
  • Pages: 19-30

Combinational coding of data taking into account the analysis of the value of the information contained

Information security application
  • 1
  • 133
  • Pages: 31-41

Method of embedding hidden data in message stream with error-correcting coding

Information security application
  • 1
  • 149
  • Pages: 42-47

A method of responding to targeted attacks based on the mapping of information security events using indication signatures

Information security application
  • 4
  • 150
  • Pages: 48-60

Risk assessment of the use of open source projects: a method for analyzing metrics of the development process

Software security
  • 0
  • 129
  • Pages: 61-71

Malware detection using deep neural networks

Software security
  • 0
  • 148
  • Pages: 72-83

Attack detection by artificial neural networks

Network and telecommunication security
  • 0
  • 145
  • Pages: 84-94

Method for ensuring data integrity in edge computing networks based on blockchain technology

Network and telecommunication security
  • 0
  • 150
  • Pages: 95-104

Decentralized messaging systems threat model

Network and telecommunication security
  • 0
  • 148
  • Pages: 105-115

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • 1
  • 134
  • Pages: 116-121

Data modeling in information security of polystorages

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 132
  • Pages: 122-132

Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip

Machine learning and knowledge control systems
  • 0
  • 131
  • Pages: 133-144

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • 0
  • 130
  • Pages: 145-155

Adversarial attacks against a machine learning based intrusion detection system

Machine learning and knowledge control systems
  • 1
  • 144
  • Pages: 156-190