Publication schedule
-
№1 March 2026
Articles by keywords "AST"
The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions
- Year: 2026
- Issue: 1
- 0
- 18
- Pages: 109-122
Analysis of information security issues in hyperconvergent infrastructure
- Year: 2026
- Issue: 1
- 0
- 19
- Pages: 87-98
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 0
- 18
- Pages: 58-68
Investigation of the confidential containers performance in fog computing for object detection tasks
- Year: 2026
- Issue: 1
- 2
- 18
- Pages: 31-57
A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity
- Year: 2023
- Issue: 3
- 1
- 373
- Pages: 103-116
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 343
- Pages: 9-23
Cyber resiliency support based on methods of graph analysis and functional network virtualization
- Year: 2023
- Issue: 2
- 0
- 356
- Pages: 107-122
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 368
- Pages: 73-81
ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 1
- 356
- Pages: 51-64
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 3
- 447
- Pages: 48-58
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 18
- 438
- Pages: 23-34
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 531
- Pages: 57-64
Security through obscurity in industrial Internet of Things
- Year: 2021
- Issue: 1
- 0
- 477
- Pages: 131-137
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 1
- 505
- Pages: 96-101
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 1
- 508
- Pages: 79-85
Selection of trust models when integrating distributed information systems of critical application
- Year: 2021
- Issue: 4
- 0
- 475
- Pages: 79-90
Method for searching for clones of program code in binary executable files
- Year: 2024
- Issue: Спецвыпуск
- 0
- 493
- Pages: 46-55
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
- Year: 2024
- Issue: 3
- 1
- 508
- Pages: 94-108
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 544
- Pages: 30-39
The probabilitic-theoretic models of physical random number generators
- Year: 2024
- Issue: 3
- 8
- 550
- Pages: 9-19
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 7
- 820
- Pages: 58-68
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 24
- 800
- Pages: 147-164