Articles by keywords "Graph"
Oblivious signature scheme based on isogenies of supersingular elliptic curves
- Year: 2023
- Issue: 4
- 1
- 138
- Pages: 116-121
Method of embedding hidden data in message stream with error-correcting coding
- Year: 2023
- Issue: 4
- 1
- 155
- Pages: 42-47
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
- Year: 2023
- Issue: 3
- 1
- 163
- Pages: 117-125
Agent-based modelling information distribution in social-information internet services
- Year: 2023
- Issue: 3
- 0
- 154
- Pages: 90-102
ADAPTIVE NEUTRALIZATION OF CYBERPHYSICAL SYSTEMS STRUCTURAL BREACH BASE ON GRAPH ARTOFOCAL NEURAL NETWORKS
- Year: 2022
- Issue: 4
- 0
- 150
- Pages: 89-100
SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION
- Year: 2022
- Issue: 4
- 0
- 152
- Pages: 20-27
THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES
- Year: 2022
- Issue: 3
- 0
- 146
- Pages: 80-89
A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY
- Year: 2022
- Issue: 3
- 1
- 151
- Pages: 68-79
AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS
- Year: 2022
- Issue: 3
- 3
- 158
- Pages: 45-54
Method of cyberphysical system topology reconfiguration based on graph artificial neural network
- Year: 2023
- Issue: 2
- 0
- 149
- Pages: 173-182
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
- Year: 2023
- Issue: 2
- 0
- 148
- Pages: 150-162
Cyber resiliency support based on methods of graph analysis and functional network virtualization
- Year: 2023
- Issue: 2
- 0
- 155
- Pages: 107-122
Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring
- Year: 2021
- Issue: 3
- 0
- 193
- Pages: 145-156
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 189
- Pages: 137-144
REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK
- Year: 2022
- Issue: 2
- 0
- 165
- Pages: 35-50
ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE
- Year: 2022
- Issue: 2
- 0
- 175
- Pages: 30-34
On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2
- Year: 2025
- Issue: 4
- 15
- 314
- Pages: 89-101
Cyber-physical systems sustainability based on graph theory
- Year: 2021
- Issue: 2
- 0
- 254
- Pages: 145-150
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 290
- Pages: 57-64
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 310
- Pages: 117-130
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 318
- Pages: 102-108
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 0
- 288
- Pages: 79-85
Two-component real-time steganographic system of information embedding in the least significant bits of audio signal
- Year: 2021
- Issue: 4
- 0
- 258
- Pages: 72-78
Criteria for synthesizing cyber resilient network structures
- Year: 2024
- Issue: Спецвыпуск
- 0
- 272
- Pages: 92-103
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 284
- Pages: 65-75
About masking method in aggregate signature protocol based on isogenies of elliptic curve
- Year: 2024
- Issue: Спецвыпуск
- 0
- 278
- Pages: 56-64
Method for searching for clones of program code in binary executable files
- Year: 2024
- Issue: Спецвыпуск
- 0
- 277
- Pages: 46-55
Prospects for the application of archigraphs in data and knowledge storage systems
- Year: 2024
- Issue: 4
- 0
- 270
- Pages: 109-139
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 1
- 322
- Pages: 74-84
Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation
- Year: 2024
- Issue: 4
- 0
- 266
- Pages: 33-41
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
- Year: 2024
- Issue: 3
- 0
- 296
- Pages: 94-108
An integral indicator of the effectiveness of the use of a group of unmanned aerial vehicles in solving aerial photography tasks
- Year: 2024
- Issue: 3
- 0
- 297
- Pages: 88-93
Detection of artificially synthesized audio files using graph neural networks
- Year: 2024
- Issue: 2
- 2
- 323
- Pages: 169-177
A model of a distributed storage system for private keys of crypto wallets
- Year: 2024
- Issue: 2
- 2
- 292
- Pages: 117-129
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 376
- Pages: 68-76
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 412
- Pages: 57-65
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 0
- 387
- Pages: 58-67
Evaluation of signal masking by a two-component steganographic system in windowed information processing
- Year: 2023
- Issue: 2
- 2
- 385
- Pages: 9-16
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 407
- Pages: 70-79
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 408
- Pages: 28-35
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 408
- Pages: 9-17
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 2
- 430
- Pages: 156-167
Hiding data in audio files using coverless steganography methods
- Year: 2025
- Issue: Спецвыпуск
- 15
- 493
- Pages: 145-155
The use of convolutional neural networks to enhance the security of steganographic methods
- Year: 2025
- Issue: Спецвыпуск
- 2
- 461
- Pages: 134-144
Lattice-based commitement scheme for proving linear relations over hidden values
- Year: 2025
- Issue: Спецвыпуск
- 0
- 418
- Pages: 23-33
Integration of guidance-based recovery mechanism into the learning with errors-based digital signature
- Year: 2025
- Issue: Спецвыпуск
- 3
- 418
- Pages: 10-22
Query processing in Data Lake Management System based on a universal data model
- Year: 2025
- Issue: 2
- 0
- 413
- Pages: 96-111
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 433
- Pages: 35-40
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
- Year: 2025
- Issue: 1
- 4
- 478
- Pages: 106-120
Multiple signatures on elliptic curve isogenies with masking and participant authentication
- Year: 2025
- Issue: 1
- 2
- 471
- Pages: 97-105
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
- Year: 2025
- Issue: 3
- 6
- 498
- Pages: 81-90
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 40
- 659
- Pages: 9-19