No. 3, 2022
Year: 2022
Issue: 3
Pages: 167
4
1875

INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS

Information security application
  • 0
  • 142
  • Pages: 9-23

MATHEMATICAL MODEL AND ALGORITHM FOR DATA INTEGRITY CONTROL BASED ON THE RULES OF CODE CONSTRUCTION WITH UNEQUAL CHARACTER PROTECTION

Information security application
  • 0
  • 148
  • Pages: 24-35

METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS

Information security application
  • 0
  • 144
  • Pages: 36-44

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • 3
  • 152
  • Pages: 45-54

SYSTEMATIZATION OF CYBER THREATS TO LARGE-SCALE SYSTEMS WITH ADAPTIVE NETWORK TOPOLOGY

Critical information infrastructure security
  • 0
  • 144
  • Pages: 55-67

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • 1
  • 146
  • Pages: 68-79

THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES

Cyber-physic systems security
  • 0
  • 141
  • Pages: 80-89

CPU MICROARCHITECTURAL VULNERABILITIES IN THE CONTEXT OF JOINT APPLICATION OF HARDWARE FOR INFORMATION PROTECTION AND VIRTUALIZATION TECHNOLOGIES IN AUTOMATED SYSTEMS

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 136
  • Pages: 90-95

THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 148
  • Pages: 96-120

A MODEL OF DIFFERENTIATION OF ACCESS RIGHTS FOR A VIRTUAL SQUAD OF UNMANNED AERIAL VEHICLES

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 146
  • Pages: 121-129

SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 142
  • Pages: 130-142

VOICE IDENTIFICATION METHOD BASED ON MACHINE LEARNING

Machine learning and knowledge control systems
  • 0
  • 143
  • Pages: 143-154

STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS

Machine learning and knowledge control systems
  • 0
  • 143
  • Pages: 155-166