Publication schedule
  • №1 March 2026

Articles by keywords "control"

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • Year: 2026
  • Issue: 1
  • 0
  • 19
  • Pages: 152-167

A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 371
  • Pages: 103-116

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 352
  • Pages: 71-88

SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 349
  • Pages: 130-142

MATHEMATICAL MODEL AND ALGORITHM FOR DATA INTEGRITY CONTROL BASED ON THE RULES OF CODE CONSTRUCTION WITH UNEQUAL CHARACTER PROTECTION

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 346
  • Pages: 24-35

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 397
  • Pages: 137-144

APPLYING OF IDENTIFICATION AND ACCESS CONTROL MANAGEMENT SYSTEM IN INDUSTRIAL CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 1
  • 395
  • Pages: 98-105

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 1
  • 356
  • Pages: 51-64

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 3
  • 447
  • Pages: 48-58

Multi-dimensional data integrity control model

Special IT
  • Year: 2021
  • Issue: 2
  • 1
  • 557
  • Pages: 97-103

Integrity control of KVM-based virtual machines components on OpenStack platform

Secure operating systems and trusted environment
  • Year: 2021
  • Issue: 2
  • 0
  • 538
  • Pages: 9-20

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 2
  • 499
  • Pages: 9-19

Development of a mechanism to control message integrity on the local network of vehicles

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 0
  • 455
  • Pages: 91-100

Verification of access control in big data systems using temporal logics

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 491
  • Pages: 146-156

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 1
  • 495
  • Pages: 63-73

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 5
  • 544
  • Pages: 30-39

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 1
  • 514
  • Pages: 104-116

ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 559
  • Pages: 20-29

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 529
  • Pages: 85-95

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 568
  • Pages: 58-67

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 622
  • Pages: 18-31

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 14
  • 684
  • Pages: 96-109

Analysis of the international standard ISO 27701 and the formation of recommendations for its use

Information security application
  • Year: 2023
  • Issue: 1
  • 8
  • 587
  • Pages: 46-53