Publication schedule
-
№1 March 2026
Articles by keywords "information"
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 0
- 17
- Pages: 123-133
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 0
- 21
- Pages: 69-86
Method of embedding hidden data in message stream with error-correcting coding
- Year: 2023
- Issue: 4
- 2
- 379
- Pages: 42-47
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 1
- 347
- Pages: 19-30
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 0
- 349
- Pages: 9-18
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 363
- Pages: 154-169
Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation
- Year: 2023
- Issue: 3
- 1
- 356
- Pages: 126-137
SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION
- Year: 2022
- Issue: 4
- 0
- 355
- Pages: 20-27
EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 4
- 1
- 346
- Pages: 9-19
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 336
- Pages: 155-166
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 351
- Pages: 36-44
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 369
- Pages: 25-32
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 1
- 346
- Pages: 191-201
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 371
- Pages: 61-72
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 397
- Pages: 137-144
Segmenting data samples for Internet of Things devices security state analysis
- Year: 2021
- Issue: 3
- 0
- 382
- Pages: 130-136
Using contradictions in data to search implicit failures in computer systems
- Year: 2021
- Issue: 3
- 0
- 411
- Pages: 63-71
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 368
- Pages: 73-81
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 3
- 448
- Pages: 48-58
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 18
- 438
- Pages: 23-34
Cyber-physical systems sustainability based on graph theory
- Year: 2021
- Issue: 2
- 0
- 470
- Pages: 145-150
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 1
- 502
- Pages: 127-134
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 526
- Pages: 109-117
Security through obscurity in industrial Internet of Things
- Year: 2021
- Issue: 1
- 0
- 477
- Pages: 131-137
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 591
- Pages: 117-130
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 2
- 510
- Pages: 109-116
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 530
- Pages: 102-108
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 1
- 505
- Pages: 96-101
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 3
- 505
- Pages: 55-61
Distributed ledger technologies application to audit and investigate incidents in big data processing systems
- Year: 2021
- Issue: 4
- 0
- 475
- Pages: 144-156
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 504
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 479
- Pages: 157-164
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 1
- 492
- Pages: 146-156
Protection of ad-hoc networks against distributed scanning from the Internet
- Year: 2024
- Issue: Спецвыпуск
- 0
- 491
- Pages: 118-128
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 481
- Pages: 104-117
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 495
- Pages: 22-32
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 479
- Pages: 142-154
Application of distributed ledger technology to protect smart city information systems
- Year: 2024
- Issue: 3
- 3
- 524
- Pages: 69-79
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 520
- Pages: 58-68
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 544
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 535
- Pages: 130-137
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 486
- Pages: 95-103
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 559
- Pages: 20-29
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 3
- 552
- Pages: 110-120
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
- Year: 2022
- Issue: 1
- 0
- 529
- Pages: 85-95
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 614
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 672
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 585
- Pages: 134-141
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 622
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 3
- 620
- Pages: 27-36
Criteria used to assess the quality of information security systems
- Year: 2023
- Issue: 1
- 1
- 575
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 601
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 2
- 605
- Pages: 50-61
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 6
- 648
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 652
- Pages: 124-133
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 13
- 697
- Pages: 82-98
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 5
- 701
- Pages: 34-47
The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems
- Year: 2025
- Issue: 2
- 5
- 659
- Pages: 131-142
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 10
- 801
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 653
- Pages: 132-144
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 8
- 766
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 21
- 858
- Pages: 30-39
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 14
- 784
- Pages: 9-20