No. 2, 2022
Year: 2022
Issue: 2
Pages: 160
5
3122

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • 1
  • 450
  • Pages: 9-19

ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS

Information security application
  • 1
  • 409
  • Pages: 20-29

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • 0
  • 213
  • Pages: 30-34

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • 0
  • 205
  • Pages: 35-50

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • 1
  • 198
  • Pages: 51-64

IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION

Critical information infrastructure security
  • 0
  • 210
  • Pages: 65-72

MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • 0
  • 200
  • Pages: 73-81

DIGITALIZATION AND IDENTIFICATION OF ECG SIGNALS USING WAVELET TECHNOLOGIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 196
  • Pages: 82-97

APPLYING OF IDENTIFICATION AND ACCESS CONTROL MANAGEMENT SYSTEM IN INDUSTRIAL CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • 1
  • 211
  • Pages: 98-105

THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 197
  • Pages: 106-124

INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE

Machine learning and knowledge control systems
  • 0
  • 209
  • Pages: 125-134

COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER

Machine learning and knowledge control systems
  • 0
  • 220
  • Pages: 135-147

PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS

Machine learning and knowledge control systems
  • 1
  • 204
  • Pages: 148-159