No. 2, 2024
Year: 2024
Issue: 2
Pages: 194
40
8946
Publication schedule
  • №1 March 2026

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • 5
  • 622
  • Pages: 9-19

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • 5
  • 672
  • Pages: 20-30

Quality improvement of information security events identification through input data splitting

Information security application
  • 0
  • 614
  • Pages: 31-43

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • 3
  • 600
  • Pages: 44-56

Countering steganalysis based on generative adversarial networks

Information security application
  • 1
  • 610
  • Pages: 57-65

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 611
  • Pages: 66-72

Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs

Research, monitoring and optimization of automated technological processes and productions control systems
  • 2
  • 501
  • Pages: 73-83

Ensuring the connectivity and functional integrity of wireless reconfigurable networks by rebuilding the topology using an improved method of network game

Critical information infrastructure security
  • 0
  • 515
  • Pages: 84-94

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • 0
  • 486
  • Pages: 95-103

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • 1
  • 514
  • Pages: 104-116

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • 2
  • 512
  • Pages: 117-129

A method for finding errors in program code based on inmemory fuzzing

Software security
  • 1
  • 535
  • Pages: 130-137

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • 14
  • 599
  • Pages: 138-151

Automatic synthesis of 3D gas turbine blades shapes using machine learning

Machine learning and knowledge control systems
  • 3
  • 528
  • Pages: 152-168

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • 2
  • 523
  • Pages: 169-177

Authorship identification and verification using machine and deep learning methods

Machine learning and knowledge control systems
  • 1
  • 504
  • Pages: 178-193