No. 2, 2024
Year: 2024
Issue: 2
Pages: 194
34
6178

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • 5
  • 450
  • Pages: 9-19

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • 5
  • 484
  • Pages: 20-30

Quality improvement of information security events identification through input data splitting

Information security application
  • 0
  • 447
  • Pages: 31-43

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • 3
  • 437
  • Pages: 44-56

Countering steganalysis based on generative adversarial networks

Information security application
  • 1
  • 447
  • Pages: 57-65

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 436
  • Pages: 66-72

Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs

Research, monitoring and optimization of automated technological processes and productions control systems
  • 1
  • 327
  • Pages: 73-83

Ensuring the connectivity and functional integrity of wireless reconfigurable networks by rebuilding the topology using an improved method of network game

Critical information infrastructure security
  • 0
  • 343
  • Pages: 84-94

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • 0
  • 323
  • Pages: 95-103

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • 0
  • 343
  • Pages: 104-116

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • 2
  • 346
  • Pages: 117-129

A method for finding errors in program code based on inmemory fuzzing

Software security
  • 0
  • 353
  • Pages: 130-137

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • 14
  • 412
  • Pages: 138-151

Automatic synthesis of 3D gas turbine blades shapes using machine learning

Machine learning and knowledge control systems
  • 1
  • 340
  • Pages: 152-168

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • 2
  • 357
  • Pages: 169-177

Authorship identification and verification using machine and deep learning methods

Machine learning and knowledge control systems
  • 0
  • 333
  • Pages: 178-193