No. 1, 2021
Year: 2021
Issue: 1
Pages: 134
12
7193
Publication schedule
  • №1 March 2026

Data structures formation in active security monitoring tasks

Information security application
  • 2
  • 499
  • Pages: 9-19

Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks

Network and telecommunication security
  • 1
  • 481
  • Pages: 20-30

Dynamic phishing website dataset collection

Network and telecommunication security
  • 0
  • 515
  • Pages: 31-38

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • 0
  • 496
  • Pages: 39-49

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • 1
  • 552
  • Pages: 50-54

Approach to detect maliscous servers on anonimous network TOR based on clasterization methods

Network and telecommunication security
  • 3
  • 505
  • Pages: 55-61

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • 0
  • 508
  • Pages: 62-78

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • 1
  • 508
  • Pages: 79-85

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • 1
  • 519
  • Pages: 86-95

Efficiency of computer network functioning in conditions of malicious information influences

Special IT
  • 1
  • 504
  • Pages: 96-101

Conceptual model of geoinformation system adaptive control under conditions of destabilization

Special IT
  • 0
  • 529
  • Pages: 102-108

Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things

Information security cyber-physic systems
  • 2
  • 509
  • Pages: 109-116

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • 0
  • 591
  • Pages: 117-130

Security through obscurity in industrial Internet of Things

Information security cyber-physic systems
  • 0
  • 477
  • Pages: 131-137