Search
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2024
Year: 2024
Issue: 1
Pages: 175
0
232
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Steganalytical modulе for insert detection in low stego-payload images
Information security application
Vilkhovsky Danil E
0
17
Pages: 9-17
Assessment of the competence of the intelligent information security management system
Information security application
Garkushev A. Yu.
Lipis A.V.
Karpova I.L.
Suprun A. F.
Shalkovskaya A.A.
0
17
Pages: 18-27
Presentation of graph-based model for use in automated security analysis systems
Information security application
Moskvin D. A.
Orel E.M.
Lyashenko A.A.
0
17
Pages: 28-35
Cyber resilience of self-organizing cyber-physical systems
Information security application
Pavlenko E. Yu.
0
17
Pages: 36-49
Protection against unauthorized access to mobile devices when applying of the BYOD concept
Information security application
Kornienko A. A.
Kornienko S. V.
Razzhivin Nikita S.
0
17
Pages: 50-61
The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks
Information security application
Kurakin A. S.
0
15
Pages: 62-69
Graph self-regulation of various types of networks with adaptive topology
Information security application
Pavlenko E. Yu.
Pahomov M. A.
0
16
Pages: 70-79
The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources
Information security application
Fedoseenko M.Yu.
0
16
Pages: 80-95
Development of attack scenarios for assessing threats related to information security breach in industrial networks
Research, monitoring and optimization of automated technological processes and productions control systems
Zaid-Alkilani M.O.
Mashkina I.V.
0
16
Pages: 96-109
Infocommunication instrumentarium for natural risk management while navigation of autonomous vessels in Arctic under climate change
Research, monitoring and optimization of automated technological processes and productions control systems
Sikarev I. A.
Abramov V. M.
Prostakevich K. S.
Abramova A. L.
Semidelova A.O.
0
17
Pages: 110-120
Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects
Software security
Markin D.O.
Saitov I.A.
0
15
Pages: 121-133
A model for finding errors in software using spot-based fuzzing
Software security
Samarin N.N.
0
15
Pages: 134-141
Protection of the machine learning models from the training data membership inference
Machine learning and knowledge control systems
Muryleva A.A.
Kalinin M. O.
Lavrova D. S.
0
15
Pages: 142-152
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
Machine learning and knowledge control systems
Fomicheva S.G.
Gayduk O.D.
0
15
Pages: 153-167
Development of reflexive and predictive competencies of information security specialists as a factor in improving the quality of professional education
Specialist training
Karpova I.L.
Garkushev A. Yu.
Suprun A. F.
0
7
Pages: 168-174
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept