Publication schedule
-
№1 March 2026
Articles by keywords "control"
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
- Year: 2026
- Issue: 1
- 0
- 19
- Pages: 152-167
A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity
- Year: 2023
- Issue: 3
- 1
- 371
- Pages: 103-116
IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY
- Year: 2022
- Issue: 4
- 0
- 352
- Pages: 71-88
SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM
- Year: 2022
- Issue: 3
- 0
- 349
- Pages: 130-142
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 397
- Pages: 137-144
ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 1
- 356
- Pages: 51-64
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 3
- 447
- Pages: 48-58
Integrity control of KVM-based virtual machines components on OpenStack platform
- Year: 2021
- Issue: 2
- 0
- 538
- Pages: 9-20
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 455
- Pages: 91-100
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 1
- 491
- Pages: 146-156
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 1
- 495
- Pages: 63-73
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 544
- Pages: 30-39
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 1
- 514
- Pages: 104-116
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 559
- Pages: 20-29
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 529
- Pages: 85-95
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 1
- 568
- Pages: 58-67
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 622
- Pages: 18-31
Analysis of the international standard ISO 27701 and the formation of recommendations for its use
- Year: 2023
- Issue: 1
- 8
- 587
- Pages: 46-53