Publication schedule
-
№1 March 2026
Articles by keywords "Information security"
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 0
- 16
- Pages: 123-133
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 0
- 21
- Pages: 69-86
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 1
- 347
- Pages: 19-30
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 0
- 349
- Pages: 9-18
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 363
- Pages: 154-169
Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation
- Year: 2023
- Issue: 3
- 1
- 355
- Pages: 126-137
EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 4
- 1
- 345
- Pages: 9-19
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 336
- Pages: 155-166
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 350
- Pages: 36-44
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 369
- Pages: 25-32
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 370
- Pages: 61-72
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 397
- Pages: 137-144
Segmenting data samples for Internet of Things devices security state analysis
- Year: 2021
- Issue: 3
- 0
- 381
- Pages: 130-136
Using contradictions in data to search implicit failures in computer systems
- Year: 2021
- Issue: 3
- 0
- 411
- Pages: 63-71
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 3
- 447
- Pages: 48-58
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 18
- 438
- Pages: 23-34
Cyber-physical systems sustainability based on graph theory
- Year: 2021
- Issue: 2
- 0
- 470
- Pages: 145-150
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 1
- 501
- Pages: 127-134
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 526
- Pages: 109-117
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 591
- Pages: 117-130
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 2
- 509
- Pages: 109-116
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 529
- Pages: 102-108
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 3
- 505
- Pages: 55-61
Distributed ledger technologies application to audit and investigate incidents in big data processing systems
- Year: 2021
- Issue: 4
- 0
- 475
- Pages: 144-156
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 504
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 479
- Pages: 157-164
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 1
- 491
- Pages: 146-156
Protection of ad-hoc networks against distributed scanning from the Internet
- Year: 2024
- Issue: Спецвыпуск
- 0
- 490
- Pages: 118-128
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 481
- Pages: 104-117
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 494
- Pages: 22-32
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 479
- Pages: 142-154
Application of distributed ledger technology to protect smart city information systems
- Year: 2024
- Issue: 3
- 3
- 524
- Pages: 69-79
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 544
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 535
- Pages: 130-137
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 486
- Pages: 95-103
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 3
- 552
- Pages: 110-120
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 614
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 672
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 585
- Pages: 134-141
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 622
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 3
- 620
- Pages: 27-36
Criteria used to assess the quality of information security systems
- Year: 2023
- Issue: 1
- 1
- 575
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 600
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 2
- 605
- Pages: 50-61
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 6
- 647
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 651
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 5
- 701
- Pages: 34-47
The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems
- Year: 2025
- Issue: 2
- 5
- 659
- Pages: 131-142
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 10
- 800
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 653
- Pages: 132-144
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 8
- 766
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 21
- 857
- Pages: 30-39
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 14
- 784
- Pages: 9-20