No. 1, 2024
Year: 2024
Issue: 1
Pages: 175
0
232

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • 0
  • 17
  • Pages: 9-17

Assessment of the competence of the intelligent information security management system

Information security application
  • 0
  • 17
  • Pages: 18-27

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • 0
  • 17
  • Pages: 28-35

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • 0
  • 17
  • Pages: 36-49

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • 0
  • 17
  • Pages: 50-61

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • 0
  • 15
  • Pages: 62-69

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • 0
  • 16
  • Pages: 70-79

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • 0
  • 16
  • Pages: 80-95

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 16
  • Pages: 96-109

Infocommunication instrumentarium for natural risk management while navigation of autonomous vessels in Arctic under climate change

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 17
  • Pages: 110-120

Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects

Software security
  • 0
  • 15
  • Pages: 121-133

A model for finding errors in software using spot-based fuzzing

Software security
  • 0
  • 15
  • Pages: 134-141

Protection of the machine learning models from the training data membership inference

Machine learning and knowledge control systems
  • 0
  • 15
  • Pages: 142-152

Intelligent mechanisms for extracting features of file modification in dynamic virus analysis

Machine learning and knowledge control systems
  • 0
  • 15
  • Pages: 153-167

Development of reflexive and predictive competencies of information security specialists as a factor in improving the quality of professional education

Specialist training
  • 0
  • 7
  • Pages: 168-174