No. 4, 2022
Year: 2022
Issue: 4
Pages: 110
3
1393

EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM

Information security aspects
  • 0
  • 141
  • Pages: 9-19

SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION

Information security aspects
  • 0
  • 147
  • Pages: 20-27

METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS

Information security application
  • 1
  • 137
  • Pages: 28-34

CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM

Information security application
  • 0
  • 133
  • Pages: 35-42

IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS

Information security application
  • 1
  • 135
  • Pages: 43-52

IMITATIONAL SOFTWARE PACKAGE FOR RESEARCHING HIGHLY DETECTABLE STEGOSYSTEMS — HUGO SYSTEMS

Information security application
  • 1
  • 136
  • Pages: 53-63

FINDING ENUMERATORS FOR A GENERALIZED (L, G)-CODE

Applied cryptography
  • 0
  • 133
  • Pages: 64-70

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • 0
  • 148
  • Pages: 71-88

ADAPTIVE NEUTRALIZATION OF CYBERPHYSICAL SYSTEMS STRUCTURAL BREACH BASE ON GRAPH ARTOFOCAL NEURAL NETWORKS

Information security cyber-physic systems
  • 0
  • 145
  • Pages: 89-100

ASPECTS OF THE DEVELOPMENT AND FUTURE PROSPECTS OF THE PROGRAM FOR AUTOMATIC PROCESSING OF SATELLITE ARCHIVES OF HYDROCHEMICAL DATA IN THE PYTHON PROGRAMMING LANGUAGE

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 138
  • Pages: 101-109