Articles by keywords "information security"

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 0
  • 69
  • Pages: 145-150

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 0
  • 74
  • Pages: 127-134

Model for forming development program of organization’s information security system

Special IT
  • Year: 2021
  • Issue: 2
  • 2
  • 94
  • Pages: 109-117

Protection against HID attacks

Special IT
  • Year: 2021
  • Issue: 2
  • 0
  • 77
  • Pages: 104-108

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 79
  • Pages: 41-47

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 93
  • Pages: 117-130

Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 86
  • Pages: 109-116

Conceptual model of geoinformation system adaptive control under conditions of destabilization

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 124
  • Pages: 102-108

Approach to detect maliscous servers on anonimous network TOR based on clasterization methods

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 81
  • Pages: 55-61

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 1
  • 82
  • Pages: 9-19

Distributed ledger technologies application to audit and investigate incidents in big data processing systems

Big Data processing security
  • Year: 2021
  • Issue: 4
  • 0
  • 80
  • Pages: 144-156

The problems of trust assessment in Big Data analysis

Big Data processing security
  • Year: 2021
  • Issue: 4
  • 0
  • 76
  • Pages: 137-143

Use of agile management tools in projects of information security systems implementation

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2021
  • Issue: 4
  • 0
  • 74
  • Pages: 123-136

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 90
  • Pages: 112-122

Selection of trust models when integrating distributed information systems of critical application

Critical information infrastructure security
  • Year: 2021
  • Issue: 4
  • 0
  • 81
  • Pages: 79-90

Research of information security problems of heterogeneous corporate computer networks

Software security
  • Year: 2021
  • Issue: 4
  • 1
  • 90
  • Pages: 26-38

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 0
  • 78
  • Pages: 9-25

Methodology for finding errors and nondeclared features in software

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 97
  • Pages: 157-164

Verification of access control in big data systems using temporal logics

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 99
  • Pages: 146-156

Protection of ad-hoc networks against distributed scanning from the Internet

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 94
  • Pages: 118-128

Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 99
  • Pages: 104-117

Predictive analysis of information flows in information security systems of telecommunication complexes

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 0
  • 100
  • Pages: 140-151

Research of information security audit problems of geographically distributed devices of the Internet of Things

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 107
  • Pages: 42-52

A method for detecting floating exploits in software at the final stage of development

Software security
  • Year: 2024
  • Issue: 4
  • 4
  • 114
  • Pages: 22-32

Analysis and forecasting the states of industrial networks with adaptive topology based on network motives

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 111
  • Pages: 142-154

Assessment of the possibility of upgrading information security systems in the planned time frame

Critical information infrastructure security
  • Year: 2024
  • Issue: 3
  • 0
  • 111
  • Pages: 80-87

Application of distributed ledger technology to protect smart city information systems

Critical information infrastructure security
  • Year: 2024
  • Issue: 3
  • 0
  • 122
  • Pages: 69-79

Security assessment of Big Data systems

Information security application
  • Year: 2024
  • Issue: 3
  • 2
  • 114
  • Pages: 40-57

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 3
  • 134
  • Pages: 30-39

Application of indicator functions in models of detection and neutralization of malicious information objects

Information security aspects
  • Year: 2024
  • Issue: 3
  • 0
  • 113
  • Pages: 20-29

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 0
  • 109
  • Pages: 130-137

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 107
  • Pages: 95-103

PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 1
  • 186
  • Pages: 121-131

METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 0
  • 189
  • Pages: 110-120

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 211
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 4
  • 227
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 1
  • 217
  • Pages: 9-19

Development of reflexive and predictive competencies of information security specialists as a factor in improving the quality of professional education

Specialist training
  • Year: 2024
  • Issue: 1
  • 0
  • 201
  • Pages: 168-174

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 218
  • Pages: 134-141

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 217
  • Pages: 18-31

ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 212
  • Pages: 27-36

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 4
  • 217
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 218
  • Pages: 80-95

CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS

Quality assessment and software systems support
  • Year: 2023
  • Issue: 1
  • 0
  • 207
  • Pages: 139-147

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 215
  • Pages: 70-79

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 209
  • Pages: 50-61

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 1
  • 236
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 228
  • Pages: 124-133

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 241
  • Pages: 34-47

The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2025
  • Issue: 2
  • 4
  • 246
  • Pages: 131-142

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 3
  • 278
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 269
  • Pages: 9-20

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 263
  • Pages: 132-144

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 5
  • 282
  • Pages: 83-96

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 5
  • 306
  • Pages: 69-80

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 4
  • 295
  • Pages: 40-54

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 8
  • 363
  • Pages: 30-39

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 6
  • 310
  • Pages: 9-20