No. 3, 2021
Year: 2021
Issue: 3
Pages: 158
2
2774

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • 1
  • 182
  • Pages: 9-15

Encrypted files detection algorithm

Software security
  • 0
  • 207
  • Pages: 16-26

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • 0
  • 189
  • Pages: 27-33

Fake posts detection using graph neural networks

Network and telecommunication security
  • 0
  • 183
  • Pages: 34-43

Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?

Applied cryptography
  • 0
  • 198
  • Pages: 44-54

Blockchain in 5G networks: perfomance comparison of private and public blockchain

Applied cryptography
  • 0
  • 186
  • Pages: 55-62

Using contradictions in data to search implicit failures in computer systems

Critical information infrastructure security
  • 0
  • 181
  • Pages: 63-71

Research of UEFI BIOS mechanisms for access to motherboard sensors from the operating system on the platform of mass chipsets on the example of temperature and voltage sensors

Critical information infrastructure security
  • 0
  • 174
  • Pages: 72-82

Noisproof digitial audio watermarking in mimo audio stegosystems

Critical information infrastructure security
  • 0
  • 170
  • Pages: 83-95

Development of a metric model of information events in the information security management system of economic activities

Critical information infrastructure security
  • 0
  • 195
  • Pages: 96-107

An approach to detecting botnet attacks in the Internet of Things networks

Cyber-physic systems security
  • 0
  • 174
  • Pages: 108-117

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • 1
  • 185
  • Pages: 118-129

Segmenting data samples for Internet of Things devices security state analysis

Cyber-physic systems security
  • 0
  • 180
  • Pages: 130-136

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • 0
  • 183
  • Pages: 137-144

Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring

Cyber-physic systems security
  • 0
  • 187
  • Pages: 145-156