Publication schedule
-
№1 March 2026
Articles by keywords "Model"
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 0
- 16
- Pages: 123-133
Analysis of information security issues in hyperconvergent infrastructure
- Year: 2026
- Issue: 1
- 0
- 19
- Pages: 87-98
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 0
- 18
- Pages: 58-68
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 0
- 349
- Pages: 9-18
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 350
- Pages: 36-44
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 343
- Pages: 9-23
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 1
- 346
- Pages: 191-201
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
- Year: 2023
- Issue: 2
- 1
- 358
- Pages: 150-162
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 397
- Pages: 137-144
THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES
- Year: 2022
- Issue: 2
- 0
- 347
- Pages: 106-124
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 368
- Pages: 73-81
IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION
- Year: 2022
- Issue: 2
- 0
- 361
- Pages: 65-72
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 418
- Pages: 9-15
A model for implementing artificial intelligence into embedded systems
- Year: 2025
- Issue: 4
- 13
- 443
- Pages: 35-47
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 526
- Pages: 109-117
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 1
- 504
- Pages: 96-101
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 455
- Pages: 91-100
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 2
- 537
- Pages: 74-84
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 1
- 559
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 494
- Pages: 109-126
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 544
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 535
- Pages: 130-137
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 3
- 552
- Pages: 110-120
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 614
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 672
- Pages: 20-30
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 619
- Pages: 153-167
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 585
- Pages: 134-141
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 3
- 619
- Pages: 27-36
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 609
- Pages: 28-35
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 4
- 673
- Pages: 168-178
Hiding data in audio files using coverless steganography methods
- Year: 2025
- Issue: Спецвыпуск
- 16
- 737
- Pages: 145-155
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 7
- 820
- Pages: 58-68
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 5
- 701
- Pages: 34-47
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 4
- 655
- Pages: 35-40
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 652
- Pages: 132-144
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 23
- 824
- Pages: 110-120
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 19
- 766
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 47
- 895
- Pages: 9-19
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 787
- Pages: 43-58
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 14
- 784
- Pages: 9-20