Articles by keywords "Information security"
Automation of information security incident detection using custom correlation rules in a SIEM system
- Year: 2026
- Issue: 1
- 7
- 321
- Pages: 187-200
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 4
- 269
- Pages: 123-133
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 6
- 274
- Pages: 69-86
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 1
- 527
- Pages: 19-30
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 1
- 534
- Pages: 9-18
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 553
- Pages: 154-169
Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation
- Year: 2023
- Issue: 3
- 1
- 541
- Pages: 126-137
EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 4
- 1
- 524
- Pages: 9-19
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 505
- Pages: 155-166
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 528
- Pages: 36-44
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 552
- Pages: 25-32
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 550
- Pages: 61-72
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 608
- Pages: 137-144
Segmenting data samples for Internet of Things devices security state analysis
- Year: 2021
- Issue: 3
- 0
- 582
- Pages: 130-136
Using contradictions in data to search implicit failures in computer systems
- Year: 2021
- Issue: 3
- 0
- 604
- Pages: 63-71
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 4
- 646
- Pages: 48-58
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 24
- 635
- Pages: 23-34
Cyber-physical systems sustainability based on graph theory
- Year: 2021
- Issue: 2
- 1
- 662
- Pages: 145-150
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 3
- 695
- Pages: 127-134
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 735
- Pages: 109-117
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 897
- Pages: 117-130
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 2
- 714
- Pages: 109-116
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 733
- Pages: 102-108
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 3
- 708
- Pages: 55-61
Distributed ledger technologies application to audit and investigate incidents in big data processing systems
- Year: 2021
- Issue: 4
- 0
- 695
- Pages: 144-156
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 695
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 3
- 717
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 668
- Pages: 157-164
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 1
- 665
- Pages: 146-156
Protection of ad-hoc networks against distributed scanning from the Internet
- Year: 2024
- Issue: Спецвыпуск
- 0
- 680
- Pages: 118-128
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 6
- 664
- Pages: 104-117
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 5
- 680
- Pages: 22-32
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 661
- Pages: 142-154
Application of distributed ledger technology to protect smart city information systems
- Year: 2024
- Issue: 3
- 5
- 721
- Pages: 69-79
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 6
- 743
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 2
- 720
- Pages: 130-137
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 664
- Pages: 95-103
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 3
- 720
- Pages: 110-120
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 811
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 865
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 748
- Pages: 134-141
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 797
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 7
- 822
- Pages: 27-36
Criteria used to assess the quality of information security systems
- Year: 2023
- Issue: 1
- 1
- 750
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 772
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 2
- 778
- Pages: 50-61
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 7
- 833
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 842
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 6
- 899
- Pages: 34-47
The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems
- Year: 2025
- Issue: 2
- 5
- 852
- Pages: 131-142
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 13
- 1036
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 1
- 850
- Pages: 132-144
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 9
- 978
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 22
- 1091
- Pages: 30-39
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 19
- 1003
- Pages: 9-20