Publication schedule
-
№1 March 2026
Articles by keywords "analysis"
Error of approximation of chi-square distribution by normal distribution as a function of sample size
- Year: 2026
- Issue: 1
- 1
- 18
- Pages: 134-151
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 2
- 353
- Pages: 61-71
Agent-based modelling information distribution in social-information internet services
- Year: 2023
- Issue: 3
- 0
- 376
- Pages: 90-102
AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS
- Year: 2022
- Issue: 3
- 3
- 378
- Pages: 45-54
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 3
- 410
- Pages: 58-69
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 418
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 3
- 469
- Pages: 118-126
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 591
- Pages: 117-130
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 1
- 552
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 496
- Pages: 39-49
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 9-25
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 484
- Pages: 65-75
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 509
- Pages: 9-21
Detection of artificially synthesized audio files using graph neural networks
- Year: 2024
- Issue: 2
- 2
- 523
- Pages: 169-177
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 567
- Pages: 68-76
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 610
- Pages: 57-65
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 619
- Pages: 153-167
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 659
- Pages: 51-57
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 6
- 616
- Pages: 32-40
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 609
- Pages: 28-35
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 607
- Pages: 9-17
The use of convolutional neural networks to enhance the security of steganographic methods
- Year: 2025
- Issue: Спецвыпуск
- 2
- 691
- Pages: 134-144
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 13
- 697
- Pages: 82-98
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 3
- 661
- Pages: 69-81
Using entropy metrics to detect data integrity attacks in real-time
- Year: 2025
- Issue: Спецвыпуск
- 5
- 637
- Pages: 48-57
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 4
- 635
- Pages: 86-95
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 7
- 734
- Pages: 41-59
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 7
- 715
- Pages: 83-96
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 8
- 766
- Pages: 69-80
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 715
- Pages: 69-82