Articles by keywords "Graph"

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2026
  • Issue: 1
  • 8
  • 276
  • Pages: 9-14

Data modeling in information security of polystorages

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 4
  • 1
  • 537
  • Pages: 122-132

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 6
  • 580
  • Pages: 116-121

Method of embedding hidden data in message stream with error-correcting coding

Information security application
  • Year: 2023
  • Issue: 4
  • 2
  • 560
  • Pages: 42-47

Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 543
  • Pages: 117-125

Agent-based modelling information distribution in social-information internet services

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 568
  • Pages: 90-102

ADAPTIVE NEUTRALIZATION OF CYBERPHYSICAL SYSTEMS STRUCTURAL BREACH BASE ON GRAPH ARTOFOCAL NEURAL NETWORKS

Information security cyber-physic systems
  • Year: 2022
  • Issue: 4
  • 2
  • 523
  • Pages: 89-100

SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION

Information security aspects
  • Year: 2022
  • Issue: 4
  • 0
  • 518
  • Pages: 20-27

THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 3
  • 526
  • Pages: 96-120

THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES

Cyber-physic systems security
  • Year: 2022
  • Issue: 3
  • 2
  • 520
  • Pages: 80-89

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 3
  • 519
  • Pages: 68-79

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 5
  • 575
  • Pages: 45-54

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 4
  • 570
  • Pages: 33-57

Method of cyberphysical system topology reconfiguration based on graph artificial neural network

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 546
  • Pages: 173-182

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 1
  • 544
  • Pages: 150-162

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 533
  • Pages: 107-122

Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 627
  • Pages: 145-156

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 608
  • Pages: 137-144

Fake posts detection using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 3
  • 3
  • 658
  • Pages: 34-43

REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 2
  • 553
  • Pages: 35-50

ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE

Applied cryptography
  • Year: 2022
  • Issue: 2
  • 1
  • 541
  • Pages: 30-34

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 28
  • 828
  • Pages: 89-101

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 1
  • 662
  • Pages: 145-150

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 734
  • Pages: 57-64

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 897
  • Pages: 117-130

Conceptual model of geoinformation system adaptive control under conditions of destabilization

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 733
  • Pages: 102-108

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 2
  • 722
  • Pages: 79-85

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 3
  • 760
  • Pages: 112-122

Two-component real-time steganographic system of information embedding in the least significant bits of audio signal

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 632
  • Pages: 72-78

Criteria for synthesizing cyber resilient network structures

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 644
  • Pages: 92-103

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 665
  • Pages: 65-75

About masking method in aggregate signature protocol based on isogenies of elliptic curve

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 650
  • Pages: 56-64

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 669
  • Pages: 46-55

Prospects for the application of archigraphs in data and knowledge storage systems

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 1
  • 648
  • Pages: 109-139

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 6
  • 745
  • Pages: 74-84

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 2
  • 638
  • Pages: 33-41

Analysis and prediction of states of industrial networks with adaptive topology based on network motifs

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 1
  • 683
  • Pages: 94-108

An integral indicator of the effectiveness of the use of a group of unmanned aerial vehicles in solving aerial photography tasks

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 0
  • 711
  • Pages: 88-93

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 2
  • 708
  • Pages: 169-177

A model of a distributed storage system for private keys of crypto wallets

Applied cryptography
  • Year: 2024
  • Issue: 2
  • 2
  • 684
  • Pages: 117-129

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 754
  • Pages: 68-76

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 799
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 6
  • 798
  • Pages: 44-56

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 744
  • Pages: 58-67

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2023
  • Issue: 2
  • 2
  • 755
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 813
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 772
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 4
  • 818
  • Pages: 62-69

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 779
  • Pages: 28-35

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 802
  • Pages: 9-17

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 7
  • 833
  • Pages: 156-167

Hiding data in audio files using coverless steganography methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 18
  • 939
  • Pages: 145-155

The use of convolutional neural networks to enhance the security of steganographic methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 889
  • Pages: 134-144

Lattice-based commitement scheme for proving linear relations over hidden values

  • Year: 2025
  • Issue: Спецвыпуск
  • 6
  • 886
  • Pages: 23-33

Integration of guidance-based recovery mechanism into the learning with errors-based digital signature

  • Year: 2025
  • Issue: Спецвыпуск
  • 18
  • 923
  • Pages: 10-22

Query processing in Data Lake Management System based on a universal data model

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 1
  • 821
  • Pages: 96-111

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 847
  • Pages: 35-40

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 7
  • 933
  • Pages: 106-120

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • Year: 2025
  • Issue: 1
  • 2
  • 849
  • Pages: 97-105

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 888
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 8
  • 874
  • Pages: 81-90

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 7
  • 957
  • Pages: 40-54

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 52
  • 1108
  • Pages: 9-19