Articles by keywords "information"
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 0
- 89
- Pages: 127-134
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 2
- 109
- Pages: 109-117
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 109
- Pages: 117-130
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 0
- 100
- Pages: 109-116
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 137
- Pages: 102-108
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 0
- 97
- Pages: 96-101
Distributed ledger technologies application to audit and investigate incidents in big data processing systems
- Year: 2021
- Issue: 4
- 0
- 93
- Pages: 144-156
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 1
- 102
- Pages: 26-38
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 111
- Pages: 157-164
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 0
- 116
- Pages: 146-156
Protection of ad-hoc networks against distributed scanning from the Internet
- Year: 2024
- Issue: Спецвыпуск
- 0
- 107
- Pages: 118-128
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 114
- Pages: 104-117
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 128
- Pages: 22-32
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 0
- 124
- Pages: 142-154
Application of distributed ledger technology to protect smart city information systems
- Year: 2024
- Issue: 3
- 0
- 135
- Pages: 69-79
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 145
- Pages: 58-68
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 3
- 148
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 124
- Pages: 130-137
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 121
- Pages: 95-103
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 206
- Pages: 20-29
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 0
- 201
- Pages: 110-120
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 191
- Pages: 85-95
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 226
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 4
- 243
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 232
- Pages: 134-141
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 233
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 1
- 229
- Pages: 27-36
Criteria used to assess the quality of information security systems
- Year: 2023
- Issue: 1
- 0
- 223
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 230
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 1
- 226
- Pages: 50-61
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 2
- 254
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 243
- Pages: 124-133
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 4
- 256
- Pages: 82-98
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 259
- Pages: 34-47
The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems
- Year: 2025
- Issue: 2
- 4
- 266
- Pages: 131-142
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 3
- 292
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 282
- Pages: 132-144
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 5
- 326
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 8
- 381
- Pages: 30-39
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 6
- 328
- Pages: 9-20