Articles by keywords "Information security"

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 14
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 0
  • 14
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 0
  • 15
  • Pages: 9-19

Development of reflexive and predictive competencies of information security specialists as a factor in improving the quality of professional education

Specialist training
  • Year: 2024
  • Issue: 1
  • 0
  • 11
  • Pages: 168-174

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 134-141

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 16
  • Pages: 18-31

ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 17
  • Pages: 27-36

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 80-95

CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS

Quality assessment and software systems support
  • Year: 2023
  • Issue: 1
  • 0
  • 16
  • Pages: 139-147

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 70-79

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 19
  • Pages: 50-61

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 26
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 27
  • Pages: 124-133

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 25
  • Pages: 34-47

The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 36
  • Pages: 131-142

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 42
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 4
  • 54
  • Pages: 9-20

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 62
  • Pages: 132-144

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 3
  • 79
  • Pages: 83-96

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 2
  • 92
  • Pages: 69-80

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 0
  • 82
  • Pages: 40-54

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 0
  • 92
  • Pages: 30-39

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 1
  • 100
  • Pages: 9-20