No. 2, 2021
Year: 2021
Issue: 2
Pages: 152
10
1281

Integrity control of KVM-based virtual machines components on OpenStack platform

Secure operating systems and trusted environment
  • 0
  • 84
  • Pages: 9-20

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • 1
  • 86
  • Pages: 21-40

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • 1
  • 79
  • Pages: 41-47

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • 0
  • 79
  • Pages: 48-56

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • 1
  • 78
  • Pages: 57-64

Security threat model of network domain name service when implementing attacking scenarios

Network and telecommunication security
  • 0
  • 78
  • Pages: 65-73

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • 0
  • 74
  • Pages: 74-81

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • 3
  • 84
  • Pages: 82-88

Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems

Applied cryptography
  • 0
  • 80
  • Pages: 89-96

Multi-dimensional data integrity control model

Special IT
  • 1
  • 95
  • Pages: 97-103

Protection against HID attacks

Special IT
  • 0
  • 77
  • Pages: 104-108

Model for forming development program of organization’s information security system

Special IT
  • 2
  • 94
  • Pages: 109-117

Detection malware based on clusterization of performed actions

Software security
  • 1
  • 73
  • Pages: 118-126

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • 0
  • 74
  • Pages: 127-134

Application of Honeypot technology with adaptive behavior for IoT networks

Information security cyber-physic systems
  • 0
  • 77
  • Pages: 135-144

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • 0
  • 69
  • Pages: 145-150