Articles by keywords "information security"
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 0
- 74
- Pages: 127-134
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 2
- 94
- Pages: 109-117
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 1
- 79
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 93
- Pages: 117-130
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 0
- 86
- Pages: 109-116
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 124
- Pages: 102-108
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 0
- 81
- Pages: 55-61
Distributed ledger technologies application to audit and investigate incidents in big data processing systems
- Year: 2021
- Issue: 4
- 0
- 80
- Pages: 144-156
Selection of trust models when integrating distributed information systems of critical application
- Year: 2021
- Issue: 4
- 0
- 81
- Pages: 79-90
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 1
- 90
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 0
- 78
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 97
- Pages: 157-164
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 0
- 99
- Pages: 146-156
Protection of ad-hoc networks against distributed scanning from the Internet
- Year: 2024
- Issue: Спецвыпуск
- 0
- 94
- Pages: 118-128
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 99
- Pages: 104-117
Predictive analysis of information flows in information security systems of telecommunication complexes
- Year: 2024
- Issue: 4
- 0
- 100
- Pages: 140-151
Research of information security audit problems of geographically distributed devices of the Internet of Things
- Year: 2024
- Issue: 4
- 0
- 107
- Pages: 42-52
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 114
- Pages: 22-32
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 0
- 111
- Pages: 142-154
Assessment of the possibility of upgrading information security systems in the planned time frame
- Year: 2024
- Issue: 3
- 0
- 111
- Pages: 80-87
Application of distributed ledger technology to protect smart city information systems
- Year: 2024
- Issue: 3
- 0
- 122
- Pages: 69-79
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 3
- 134
- Pages: 30-39
Application of indicator functions in models of detection and neutralization of malicious information objects
- Year: 2024
- Issue: 3
- 0
- 113
- Pages: 20-29
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 109
- Pages: 130-137
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 107
- Pages: 95-103
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 211
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 4
- 227
- Pages: 20-30
Reconfiguration of the system development model information security management: interaction of base modules with the operator
- Year: 2024
- Issue: 2
- 1
- 217
- Pages: 9-19
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 218
- Pages: 134-141
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 217
- Pages: 18-31
ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS
- Year: 2023
- Issue: 2
- 1
- 212
- Pages: 27-36
CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS
- Year: 2023
- Issue: 1
- 0
- 207
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 215
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 1
- 209
- Pages: 50-61
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 1
- 236
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 228
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 241
- Pages: 34-47
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 3
- 278
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 263
- Pages: 132-144
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 5
- 282
- Pages: 83-96
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 5
- 306
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 8
- 363
- Pages: 30-39
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 6
- 310
- Pages: 9-20