No. 2, 2024
Year: 2024
Issue: 2
Pages: 194
22
2465

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • 1
  • 217
  • Pages: 9-19

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • 4
  • 227
  • Pages: 20-30

Quality improvement of information security events identification through input data splitting

Information security application
  • 0
  • 211
  • Pages: 31-43

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • 1
  • 220
  • Pages: 44-56

Countering steganalysis based on generative adversarial networks

Information security application
  • 1
  • 209
  • Pages: 57-65

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 210
  • Pages: 66-72

Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs

Research, monitoring and optimization of automated technological processes and productions control systems
  • 1
  • 114
  • Pages: 73-83

Ensuring the connectivity and functional integrity of wireless reconfigurable networks by rebuilding the topology using an improved method of network game

Critical information infrastructure security
  • 0
  • 106
  • Pages: 84-94

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • 0
  • 107
  • Pages: 95-103

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • 0
  • 108
  • Pages: 104-116

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • 2
  • 112
  • Pages: 117-129

A method for finding errors in program code based on inmemory fuzzing

Software security
  • 0
  • 109
  • Pages: 130-137

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • 11
  • 174
  • Pages: 138-151

Automatic synthesis of 3D gas turbine blades shapes using machine learning

Machine learning and knowledge control systems
  • 1
  • 113
  • Pages: 152-168

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • 0
  • 117
  • Pages: 169-177

Authorship identification and verification using machine and deep learning methods

Machine learning and knowledge control systems
  • 0
  • 111
  • Pages: 178-193