Publication schedule
  • №1 March 2026

Articles by keywords "Graph"

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2026
  • Issue: 1
  • 0
  • 17
  • Pages: 9-14

Data modeling in information security of polystorages

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 4
  • 1
  • 356
  • Pages: 122-132

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 5
  • 363
  • Pages: 116-121

Method of embedding hidden data in message stream with error-correcting coding

Information security application
  • Year: 2023
  • Issue: 4
  • 2
  • 378
  • Pages: 42-47

Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 363
  • Pages: 117-125

Agent-based modelling information distribution in social-information internet services

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 376
  • Pages: 90-102

ADAPTIVE NEUTRALIZATION OF CYBERPHYSICAL SYSTEMS STRUCTURAL BREACH BASE ON GRAPH ARTOFOCAL NEURAL NETWORKS

Information security cyber-physic systems
  • Year: 2022
  • Issue: 4
  • 1
  • 352
  • Pages: 89-100

SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION

Information security aspects
  • Year: 2022
  • Issue: 4
  • 0
  • 354
  • Pages: 20-27

THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 338
  • Pages: 96-120

THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES

Cyber-physic systems security
  • Year: 2022
  • Issue: 3
  • 2
  • 340
  • Pages: 80-89

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 1
  • 340
  • Pages: 68-79

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 3
  • 378
  • Pages: 45-54

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 2
  • 364
  • Pages: 33-57

Method of cyberphysical system topology reconfiguration based on graph artificial neural network

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 368
  • Pages: 173-182

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 1
  • 358
  • Pages: 150-162

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 356
  • Pages: 107-122

Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 427
  • Pages: 145-156

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 397
  • Pages: 137-144

Fake posts detection using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 3
  • 3
  • 447
  • Pages: 34-43

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 2
  • 373
  • Pages: 35-50

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 0
  • 366
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 21
  • 591
  • Pages: 89-101

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 0
  • 470
  • Pages: 145-150

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 530
  • Pages: 57-64

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 591
  • Pages: 117-130

Conceptual model of geoinformation system adaptive control under conditions of destabilization

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 529
  • Pages: 102-108

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 508
  • Pages: 79-85

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 2
  • 534
  • Pages: 112-122

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 454
  • Pages: 72-78

Criteria for synthesizing cyber resilient network structures

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 470
  • Pages: 92-103

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 484
  • Pages: 65-75

About masking method in aggregate signature protocol based on isogenies of elliptic curve

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 480
  • Pages: 56-64

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 493
  • Pages: 46-55

Prospects for the application of archigraphs in data and knowledge storage systems

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 0
  • 465
  • Pages: 109-139

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 2
  • 537
  • Pages: 74-84

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 1
  • 458
  • Pages: 33-41

Analysis and prediction of states of industrial networks with adaptive topology based on network motifs

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 1
  • 508
  • Pages: 94-108

An integral indicator of the effectiveness of the use of a group of unmanned aerial vehicles in solving aerial photography tasks

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 0
  • 524
  • Pages: 88-93

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 2
  • 523
  • Pages: 169-177

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 512
  • Pages: 117-129

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 567
  • Pages: 68-76

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 610
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 3
  • 600
  • Pages: 44-56

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 568
  • Pages: 58-67

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2023
  • Issue: 2
  • 2
  • 581
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 612
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 600
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 626
  • Pages: 62-69

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 609
  • Pages: 28-35

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 607
  • Pages: 9-17

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 6
  • 647
  • Pages: 156-167

Hiding data in audio files using coverless steganography methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 16
  • 737
  • Pages: 145-155

The use of convolutional neural networks to enhance the security of steganographic methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 691
  • Pages: 134-144

Lattice-based commitement scheme for proving linear relations over hidden values

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 662
  • Pages: 23-33

Integration of guidance-based recovery mechanism into the learning with errors-based digital signature

  • Year: 2025
  • Issue: Спецвыпуск
  • 16
  • 735
  • Pages: 10-22

Query processing in Data Lake Management System based on a universal data model

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 643
  • Pages: 96-111

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 4
  • 655
  • Pages: 35-40

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 6
  • 720
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 677
  • Pages: 97-105

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 712
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 8
  • 697
  • Pages: 81-90

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 7
  • 754
  • Pages: 40-54

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 47
  • 895
  • Pages: 9-19