Articles by keywords "control"
A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity
- Year: 2023
- Issue: 3
- 1
- 154
- Pages: 103-116
IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY
- Year: 2022
- Issue: 4
- 0
- 149
- Pages: 71-88
SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM
- Year: 2022
- Issue: 3
- 0
- 143
- Pages: 130-142
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 185
- Pages: 137-144
ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 157
- Pages: 51-64
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 0
- 180
- Pages: 48-58
Integrity control of KVM-based virtual machines components on OpenStack platform
- Year: 2021
- Issue: 2
- 0
- 290
- Pages: 9-20
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 248
- Pages: 91-100
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 1
- 278
- Pages: 146-156
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 0
- 278
- Pages: 63-73
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 321
- Pages: 30-39
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 0
- 294
- Pages: 104-116
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 372
- Pages: 20-29
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 336
- Pages: 85-95
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 0
- 383
- Pages: 58-67
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 404
- Pages: 18-31
Analysis of the international standard ISO 27701 and the formation of recommendations for its use
- Year: 2023
- Issue: 1
- 2
- 372
- Pages: 46-53