No. 2, 2024
Year: 2024
Issue: 2
Pages: 194
59
11917

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • 5
  • 797
  • Pages: 9-19

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • 5
  • 861
  • Pages: 20-30

Quality improvement of information security events identification through input data splitting

Information security application
  • 0
  • 805
  • Pages: 31-43

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • 6
  • 794
  • Pages: 44-56

Countering steganalysis based on generative adversarial networks

Information security application
  • 1
  • 793
  • Pages: 57-65

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 790
  • Pages: 66-72

Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs

Research, monitoring and optimization of automated technological processes and productions control systems
  • 2
  • 685
  • Pages: 73-83

Ensuring the connectivity and functional integrity of wireless reconfigurable networks by rebuilding the topology using an improved method of network game

Critical information infrastructure security
  • 0
  • 705
  • Pages: 84-94

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • 0
  • 660
  • Pages: 95-103

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • 1
  • 691
  • Pages: 104-116

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • 2
  • 680
  • Pages: 117-129

A method for finding errors in program code based on inmemory fuzzing

Software security
  • 2
  • 714
  • Pages: 130-137

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • 25
  • 840
  • Pages: 138-151

Automatic synthesis of 3D gas turbine blades shapes using machine learning

Machine learning and knowledge control systems
  • 6
  • 710
  • Pages: 152-168

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • 2
  • 702
  • Pages: 169-177

Authorship identification and verification using machine and deep learning methods

Machine learning and knowledge control systems
  • 2
  • 690
  • Pages: 178-193