No. 1, 2026
Year: 2026
Issue: 1
Pages: 214
153
3979

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • 8
  • 272
  • Pages: 9-14

A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions

Information security application
  • 15
  • 245
  • Pages: 15-30

Investigation of the confidential containers performance in fog computing for object detection tasks

Software security
  • 10
  • 252
  • Pages: 31-57

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • 6
  • 266
  • Pages: 58-68

Usage of the subject-object model in the task of detecting malicious software in the Android OS

Software security
  • 6
  • 269
  • Pages: 69-86

Analysis of information security issues in hyperconvergent infrastructure

Network and telecommunication security
  • 6
  • 254
  • Pages: 87-98

Adaptive architecture for secure remote access to corporate hosting services

Network and telecommunication security
  • 5
  • 252
  • Pages: 99-108

The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions

Network and telecommunication security
  • 2
  • 236
  • Pages: 109-122

Multi-level model of secure interoperability in e-commerce based on a security profile

Network and telecommunication security
  • 4
  • 264
  • Pages: 123-133

Error of approximation of chi-square distribution by normal distribution as a function of sample size

Applied cryptography
  • 13
  • 296
  • Pages: 134-151

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • 11
  • 288
  • Pages: 152-167

Automation of water transport activities using factorial approach to risk managemen

Cyber-physic systems security
  • 2
  • 234
  • Pages: 168-175

Identification of a person in uniform based on video stream data using the YOLO convolutional neural network

Machine learning and knowledge control systems
  • 5
  • 267
  • Pages: 176-186

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • 7
  • 315
  • Pages: 187-200

Use of large language models for security event analysis

Machine learning and knowledge control systems
  • 5
  • 269
  • Pages: 201-213