Articles by keywords "control"

A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 154
  • Pages: 103-116

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 149
  • Pages: 71-88

SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 143
  • Pages: 130-142

MATHEMATICAL MODEL AND ALGORITHM FOR DATA INTEGRITY CONTROL BASED ON THE RULES OF CODE CONSTRUCTION WITH UNEQUAL CHARACTER PROTECTION

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 149
  • Pages: 24-35

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 185
  • Pages: 137-144

APPLYING OF IDENTIFICATION AND ACCESS CONTROL MANAGEMENT SYSTEM IN INDUSTRIAL CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 1
  • 169
  • Pages: 98-105

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 157
  • Pages: 51-64

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 0
  • 180
  • Pages: 48-58

Multi-dimensional data integrity control model

Special IT
  • Year: 2021
  • Issue: 2
  • 1
  • 290
  • Pages: 97-103

Integrity control of KVM-based virtual machines components on OpenStack platform

Secure operating systems and trusted environment
  • Year: 2021
  • Issue: 2
  • 0
  • 290
  • Pages: 9-20

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 1
  • 277
  • Pages: 9-19

Development of a mechanism to control message integrity on the local network of vehicles

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 0
  • 248
  • Pages: 91-100

Verification of access control in big data systems using temporal logics

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 278
  • Pages: 146-156

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 278
  • Pages: 63-73

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 5
  • 321
  • Pages: 30-39

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 294
  • Pages: 104-116

ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 372
  • Pages: 20-29

CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 336
  • Pages: 85-95

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 383
  • Pages: 58-67

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 404
  • Pages: 18-31

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 8
  • 421
  • Pages: 96-109

Analysis of the international standard ISO 27701 and the formation of recommendations for its use

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 372
  • Pages: 46-53