No. 1, 2026
Year: 2026
Issue: 1
Pages: 214
21
222
Publication schedule
  • №1 March 2026

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • 0
  • 14
  • Pages: 9-14

A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions

Information security application
  • 1
  • 21
  • Pages: 15-30

Investigation of the confidential containers performance in fog computing for object detection tasks

Software security
  • 2
  • 15
  • Pages: 31-57

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • 0
  • 15
  • Pages: 58-68

Usage of the subject-object model in the task of detecting malicious software in the Android OS

Software security
  • 0
  • 18
  • Pages: 69-86

Analysis of information security issues in hyperconvergent infrastructure

Network and telecommunication security
  • 0
  • 15
  • Pages: 87-98

Adaptive architecture for secure remote access to corporate hosting services

Network and telecommunication security
  • 1
  • 15
  • Pages: 99-108

The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions

Network and telecommunication security
  • 0
  • 13
  • Pages: 109-122

Multi-level model of secure interoperability in e-commerce based on a security profile

Network and telecommunication security
  • 0
  • 13
  • Pages: 123-133

Error of approximation of chi-square distribution by normal distribution as a function of sample size

Applied cryptography
  • 1
  • 15
  • Pages: 134-151

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • 0
  • 16
  • Pages: 152-167

Automation of water transport activities using factorial approach to risk managemen

Cyber-physic systems security
  • 1
  • 16
  • Pages: 168-175

Identification of a person in uniform based on video stream data using the YOLO convolutional neural network

Machine learning and knowledge control systems
  • 0
  • 12
  • Pages: 176-186

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • 0
  • 11
  • Pages: 187-200

Use of large language models for security event analysis

Machine learning and knowledge control systems
  • 1
  • 13
  • Pages: 201-213