Articles by keywords "Information security"
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 14
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 0
- 14
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 0
- 16
- Pages: 134-141
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 16
- Pages: 18-31
ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS
- Year: 2023
- Issue: 2
- 0
- 17
- Pages: 27-36
CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS
- Year: 2023
- Issue: 1
- 0
- 16
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 0
- 17
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 0
- 19
- Pages: 50-61
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 0
- 26
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 27
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 25
- Pages: 34-47
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 0
- 42
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 62
- Pages: 132-144
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 3
- 79
- Pages: 83-96
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 2
- 92
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 0
- 92
- Pages: 30-39
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 1
- 100
- Pages: 9-20