Articles by keywords "Graph"

Data modeling in information security of polystorages

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 4
  • 0
  • 138
  • Pages: 122-132

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 1
  • 138
  • Pages: 116-121

Method of embedding hidden data in message stream with error-correcting coding

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 155
  • Pages: 42-47

Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 163
  • Pages: 117-125

Agent-based modelling information distribution in social-information internet services

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 154
  • Pages: 90-102

ADAPTIVE NEUTRALIZATION OF CYBERPHYSICAL SYSTEMS STRUCTURAL BREACH BASE ON GRAPH ARTOFOCAL NEURAL NETWORKS

Information security cyber-physic systems
  • Year: 2022
  • Issue: 4
  • 0
  • 150
  • Pages: 89-100

SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION

Information security aspects
  • Year: 2022
  • Issue: 4
  • 0
  • 152
  • Pages: 20-27

THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 152
  • Pages: 96-120

THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES

Cyber-physic systems security
  • Year: 2022
  • Issue: 3
  • 0
  • 146
  • Pages: 80-89

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 1
  • 151
  • Pages: 68-79

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 3
  • 158
  • Pages: 45-54

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 153
  • Pages: 33-57

Method of cyberphysical system topology reconfiguration based on graph artificial neural network

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 149
  • Pages: 173-182

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 148
  • Pages: 150-162

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 155
  • Pages: 107-122

Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 193
  • Pages: 145-156

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 189
  • Pages: 137-144

Fake posts detection using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 3
  • 0
  • 189
  • Pages: 34-43

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 165
  • Pages: 35-50

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 175
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 15
  • 314
  • Pages: 89-101

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 0
  • 254
  • Pages: 145-150

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 290
  • Pages: 57-64

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 310
  • Pages: 117-130

Conceptual model of geoinformation system adaptive control under conditions of destabilization

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 318
  • Pages: 102-108

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 288
  • Pages: 79-85

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 283
  • Pages: 112-122

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 258
  • Pages: 72-78

Criteria for synthesizing cyber resilient network structures

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 272
  • Pages: 92-103

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 284
  • Pages: 65-75

About masking method in aggregate signature protocol based on isogenies of elliptic curve

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 278
  • Pages: 56-64

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 277
  • Pages: 46-55

Prospects for the application of archigraphs in data and knowledge storage systems

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 0
  • 270
  • Pages: 109-139

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 1
  • 322
  • Pages: 74-84

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 266
  • Pages: 33-41

Analysis and prediction of states of industrial networks with adaptive topology based on network motifs

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 0
  • 296
  • Pages: 94-108

An integral indicator of the effectiveness of the use of a group of unmanned aerial vehicles in solving aerial photography tasks

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 0
  • 297
  • Pages: 88-93

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 2
  • 323
  • Pages: 169-177

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 292
  • Pages: 117-129

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 376
  • Pages: 68-76

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 412
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 3
  • 407
  • Pages: 44-56

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 387
  • Pages: 58-67

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2023
  • Issue: 2
  • 2
  • 385
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 413
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 407
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 414
  • Pages: 62-69

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 408
  • Pages: 28-35

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 408
  • Pages: 9-17

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 430
  • Pages: 156-167

Hiding data in audio files using coverless steganography methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 15
  • 493
  • Pages: 145-155

The use of convolutional neural networks to enhance the security of steganographic methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 461
  • Pages: 134-144

Lattice-based commitement scheme for proving linear relations over hidden values

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 418
  • Pages: 23-33

Integration of guidance-based recovery mechanism into the learning with errors-based digital signature

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 418
  • Pages: 10-22

Query processing in Data Lake Management System based on a universal data model

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 413
  • Pages: 96-111

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 433
  • Pages: 35-40

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 4
  • 478
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 471
  • Pages: 97-105

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 493
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 6
  • 498
  • Pages: 81-90

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 4
  • 502
  • Pages: 40-54

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 40
  • 659
  • Pages: 9-19