No. 1, 2022
Year: 2022
Issue: 1
Pages: 133
10
2436

ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS

Information security aspects
  • 0
  • 221
  • Pages: 11-17

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • 0
  • 217
  • Pages: 18-31

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T'S MITRE KNOWLEDGE BASE

Software security
  • 5
  • 227
  • Pages: 32-40

IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS

Network and telecommunication security
  • 1
  • 209
  • Pages: 41-50

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • 1
  • 225
  • Pages: 51-57

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • 0
  • 206
  • Pages: 58-67

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • 0
  • 190
  • Pages: 68-76

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • 0
  • 191
  • Pages: 77-84

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • 0
  • 177
  • Pages: 85-95

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • 2
  • 198
  • Pages: 96-109

METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 189
  • Pages: 110-120

PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING

Technological systems, algorithmization of tasks and control objects modeling
  • 1
  • 186
  • Pages: 121-131