Articles by keywords "security"

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 14
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 0
  • 14
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 0
  • 15
  • Pages: 9-19

Development of reflexive and predictive competencies of information security specialists as a factor in improving the quality of professional education

Specialist training
  • Year: 2024
  • Issue: 1
  • 0
  • 11
  • Pages: 168-174

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 134-141

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 0
  • 16
  • Pages: 51-57

IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 0
  • 17
  • Pages: 41-50

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 0
  • 16
  • Pages: 32-40

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 16
  • Pages: 18-31

ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 17
  • Pages: 27-36

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 80-95

CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS

Quality assessment and software systems support
  • Year: 2023
  • Issue: 1
  • 0
  • 16
  • Pages: 139-147

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 70-79

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 19
  • Pages: 50-61

FORMING THE CULTURE OF DIGITAL SECURITY OF STUDENTS OF HIGHER EDUCATIONAL INSTITUTIONS OF SHIPBUILDING PROFILE

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 17
  • Pages: 54-61

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 18
  • Pages: 36-49

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 18
  • Pages: 28-35

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 35
  • Pages: 168-178

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 26
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 27
  • Pages: 124-133

Automated security analysis of software for the Android operating system

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 25
  • Pages: 112-123

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 25
  • Pages: 69-81

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 25
  • Pages: 34-47

The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 36
  • Pages: 131-142

Protection of blockchain systems of smart cities against a selfish mining attack

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 0
  • 36
  • Pages: 60-70

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 39
  • Pages: 35-40

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 42
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 4
  • 54
  • Pages: 9-20

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 62
  • Pages: 132-144

A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 59
  • Pages: 121-131

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 3
  • 79
  • Pages: 83-96

Global practices in regulating and implementing generative artificial intelligence in higher education

Specialist training
  • Year: 2025
  • Issue: 3
  • 2
  • 99
  • Pages: 192-212

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 0
  • 82
  • Pages: 165-179

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 2
  • 85
  • Pages: 91-99

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 2
  • 92
  • Pages: 69-80

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 0
  • 82
  • Pages: 40-54

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 0
  • 92
  • Pages: 30-39

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 1
  • 91
  • Pages: 59-68

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 1
  • 100
  • Pages: 9-20