No. 2, 2021
Year: 2021
Issue: 2
Pages: 152
36
11419

Integrity control of KVM-based virtual machines components on OpenStack platform

Secure operating systems and trusted environment
  • 2
  • 754
  • Pages: 9-20

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • 2
  • 742
  • Pages: 21-40

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • 3
  • 712
  • Pages: 41-47

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • 0
  • 741
  • Pages: 48-56

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • 1
  • 729
  • Pages: 57-64

Security threat model of network domain name service when implementing attacking scenarios

Network and telecommunication security
  • 2
  • 710
  • Pages: 65-73

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • 1
  • 662
  • Pages: 74-81

Authentication of intelligent electronic devices in IoT network with the edge computing architecture

Applied cryptography
  • 3
  • 700
  • Pages: 82-88

Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems

Applied cryptography
  • 0
  • 653
  • Pages: 89-96

Multi-dimensional data integrity control model

Special IT
  • 1
  • 788
  • Pages: 97-103

Protection against HID attacks

Special IT
  • 5
  • 758
  • Pages: 104-108

Model for forming development program of organization’s information security system

Special IT
  • 5
  • 731
  • Pages: 109-117

Detection malware based on clusterization of performed actions

Software security
  • 4
  • 655
  • Pages: 118-126

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • 3
  • 687
  • Pages: 127-134

Application of Honeypot technology with adaptive behavior for IoT networks

Information security cyber-physic systems
  • 3
  • 739
  • Pages: 135-144

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • 1
  • 658
  • Pages: 145-150