Publication schedule
  • №1 March 2026

Articles by keywords "AST"

The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 18
  • Pages: 109-122

Analysis of information security issues in hyperconvergent infrastructure

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 19
  • Pages: 87-98

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 0
  • 18
  • Pages: 58-68

Investigation of the confidential containers performance in fog computing for object detection tasks

Software security
  • Year: 2026
  • Issue: 1
  • 2
  • 18
  • Pages: 31-57

A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 373
  • Pages: 103-116

THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 339
  • Pages: 96-120

INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 343
  • Pages: 9-23

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 356
  • Pages: 107-122

Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities

Critical information infrastructure security
  • Year: 2023
  • Issue: 2
  • 0
  • 395
  • Pages: 92-106

MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 368
  • Pages: 73-81

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 1
  • 356
  • Pages: 51-64

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 3
  • 447
  • Pages: 48-58

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 18
  • 438
  • Pages: 23-34

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 531
  • Pages: 57-64

Security through obscurity in industrial Internet of Things

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 477
  • Pages: 131-137

Efficiency of computer network functioning in conditions of malicious information influences

Special IT
  • Year: 2021
  • Issue: 1
  • 1
  • 505
  • Pages: 96-101

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 508
  • Pages: 79-85

Selection of trust models when integrating distributed information systems of critical application

Critical information infrastructure security
  • Year: 2021
  • Issue: 4
  • 0
  • 475
  • Pages: 79-90

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 493
  • Pages: 46-55

Analysis and prediction of states of industrial networks with adaptive topology based on network motifs

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 1
  • 508
  • Pages: 94-108

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 5
  • 544
  • Pages: 30-39

The probabilitic-theoretic models of physical random number generators

Information security aspects
  • Year: 2024
  • Issue: 3
  • 8
  • 550
  • Pages: 9-19

Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 2
  • 2
  • 501
  • Pages: 73-83

Application of large language models in event forecasting field

  • Year: 2025
  • Issue: Спецвыпуск
  • 7
  • 820
  • Pages: 58-68

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 24
  • 800
  • Pages: 147-164