Publication schedule
  • №1 March 2026

Articles by keywords "security"

Use of large language models for security event analysis

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 1
  • 16
  • Pages: 201-213

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 0
  • 14
  • Pages: 187-200

Identification of a person in uniform based on video stream data using the YOLO convolutional neural network

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 0
  • 15
  • Pages: 176-186

Multi-level model of secure interoperability in e-commerce based on a security profile

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 16
  • Pages: 123-133

The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 16
  • Pages: 109-122

Adaptive architecture for secure remote access to corporate hosting services

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 1
  • 18
  • Pages: 99-108

Usage of the subject-object model in the task of detecting malicious software in the Android OS

Software security
  • Year: 2026
  • Issue: 1
  • 0
  • 21
  • Pages: 69-86

A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions

Information security application
  • Year: 2026
  • Issue: 1
  • 1
  • 24
  • Pages: 15-30

Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 340
  • Pages: 133-144

Data modeling in information security of polystorages

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 4
  • 1
  • 356
  • Pages: 122-132

Method for ensuring data integrity in edge computing networks based on blockchain technology

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 2
  • 369
  • Pages: 95-104

A method of responding to targeted attacks based on the mapping of information security events using indication signatures

Information security application
  • Year: 2023
  • Issue: 4
  • 13
  • 397
  • Pages: 48-60

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 347
  • Pages: 19-30

Substantiation of the rational composition of the information security system

Information security aspects
  • Year: 2023
  • Issue: 4
  • 0
  • 349
  • Pages: 9-18

Multi-label classification of labels of system logs of computer networks. Formalization of the task

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 3
  • 1
  • 363
  • Pages: 154-169

Modeling of work of an employee of the information security service of an industrial enterprise

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2023
  • Issue: 3
  • 0
  • 343
  • Pages: 148-153

Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 3
  • 1
  • 355
  • Pages: 126-137

Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 363
  • Pages: 117-125

A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 371
  • Pages: 103-116

Ranking model of the system of compromise indicators of nodes of a corporate data transmission network

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 351
  • Pages: 82-89

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 338
  • Pages: 70-81

SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION

Information security aspects
  • Year: 2022
  • Issue: 4
  • 0
  • 354
  • Pages: 20-27

EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM

Information security aspects
  • Year: 2022
  • Issue: 4
  • 1
  • 345
  • Pages: 9-19

STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 336
  • Pages: 155-166

METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 350
  • Pages: 36-44

INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 343
  • Pages: 9-23

Improving the quality of information security state identification based on sample segmentation

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 368
  • Pages: 25-32

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 3
  • 378
  • Pages: 9-24

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 2
  • 1
  • 363
  • Pages: 202-211

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 1
  • 358
  • Pages: 150-162

Methods of monitoring the execution of the security pattern in infocommunication systems

Network and telecommunication security
  • Year: 2023
  • Issue: 2
  • 0
  • 370
  • Pages: 61-72

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 397
  • Pages: 137-144

Segmenting data samples for Internet of Things devices security state analysis

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 381
  • Pages: 130-136

INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 377
  • Pages: 125-134

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 414
  • Pages: 118-129

Development of a metric model of information events in the information security management system of economic activities

Critical information infrastructure security
  • Year: 2021
  • Issue: 3
  • 0
  • 424
  • Pages: 96-107

Using contradictions in data to search implicit failures in computer systems

Critical information infrastructure security
  • Year: 2021
  • Issue: 3
  • 0
  • 411
  • Pages: 63-71

Fake posts detection using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 3
  • 3
  • 447
  • Pages: 34-43

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 2
  • 418
  • Pages: 9-15

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 23
  • 595
  • Pages: 138-162

Software for detecting potentially dangerous items at mass event entries using computer vision

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2025
  • Issue: 4
  • 4
  • 392
  • Pages: 110-120

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 10
  • 424
  • Pages: 76-88

Authentication of electronic vehicle control units based on hidden channels

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 14
  • 468
  • Pages: 59-75

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 3
  • 447
  • Pages: 48-58

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 18
  • 437
  • Pages: 23-34

Cyber-physical systems sustainability based on graph theory

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 0
  • 470
  • Pages: 145-150

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 1
  • 501
  • Pages: 127-134

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 3
  • 469
  • Pages: 118-126

Model for forming development program of organization’s information security system

Special IT
  • Year: 2021
  • Issue: 2
  • 5
  • 526
  • Pages: 109-117

Protection against HID attacks

Special IT
  • Year: 2021
  • Issue: 2
  • 3
  • 540
  • Pages: 104-108

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 3
  • 521
  • Pages: 41-47

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 535
  • Pages: 21-40

Security through obscurity in industrial Internet of Things

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 477
  • Pages: 131-137

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 591
  • Pages: 117-130

Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 2
  • 509
  • Pages: 109-116

Conceptual model of geoinformation system adaptive control under conditions of destabilization

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 529
  • Pages: 102-108

Approach to detect maliscous servers on anonimous network TOR based on clasterization methods

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 3
  • 505
  • Pages: 55-61

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 2
  • 499
  • Pages: 9-19

Distributed ledger technologies application to audit and investigate incidents in big data processing systems

Big Data processing security
  • Year: 2021
  • Issue: 4
  • 0
  • 474
  • Pages: 144-156

The problems of trust assessment in Big Data analysis

Big Data processing security
  • Year: 2021
  • Issue: 4
  • 0
  • 526
  • Pages: 137-143

Use of agile management tools in projects of information security systems implementation

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2021
  • Issue: 4
  • 0
  • 467
  • Pages: 123-136

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 2
  • 534
  • Pages: 112-122

Artificial immunization in cybersecurity duties

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 486
  • Pages: 101-111

Development of a mechanism to control message integrity on the local network of vehicles

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 0
  • 455
  • Pages: 91-100

Selection of trust models when integrating distributed information systems of critical application

Critical information infrastructure security
  • Year: 2021
  • Issue: 4
  • 0
  • 475
  • Pages: 79-90

Research of information security problems of heterogeneous corporate computer networks

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 503
  • Pages: 26-38

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 503
  • Pages: 9-25

Methodology for finding errors and nondeclared features in software

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 479
  • Pages: 157-164

Verification of access control in big data systems using temporal logics

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 491
  • Pages: 146-156

Assessment of the descriptive ability of modern data sources for analyzing cyber security threats

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 487
  • Pages: 129-145

Protection of ad-hoc networks against distributed scanning from the Internet

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 490
  • Pages: 118-128

Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 481
  • Pages: 104-117

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 493
  • Pages: 46-55

Formal statement of the problem of morphizing executive code during the work of software

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 463
  • Pages: 17-23

A concept of the protected distributed ledger technology for smart city digital environment

  • Year: 2024
  • Issue: Спецвыпуск
  • 3
  • 495
  • Pages: 10-16

Predictive analysis of information flows in information security systems of telecommunication complexes

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 0
  • 488
  • Pages: 140-151

A protection method for the global model of the federated learning systems based on a trust model

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 4
  • 4
  • 511
  • Pages: 94-108

Research of information security audit problems of geographically distributed devices of the Internet of Things

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 501
  • Pages: 42-52

A method for detecting floating exploits in software at the final stage of development

Software security
  • Year: 2024
  • Issue: 4
  • 4
  • 491
  • Pages: 22-32

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 509
  • Pages: 9-21

Analysis and forecasting the states of industrial networks with adaptive topology based on network motives

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 479
  • Pages: 142-154

Assessment of the possibility of upgrading information security systems in the planned time frame

Critical information infrastructure security
  • Year: 2024
  • Issue: 3
  • 0
  • 500
  • Pages: 80-87

Application of distributed ledger technology to protect smart city information systems

Critical information infrastructure security
  • Year: 2024
  • Issue: 3
  • 3
  • 523
  • Pages: 69-79

Security assessment of Big Data systems

Information security application
  • Year: 2024
  • Issue: 3
  • 4
  • 526
  • Pages: 40-57

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 5
  • 544
  • Pages: 30-39

Application of indicator functions in models of detection and neutralization of malicious information objects

Information security aspects
  • Year: 2024
  • Issue: 3
  • 2
  • 493
  • Pages: 20-29

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 14
  • 599
  • Pages: 138-151

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 1
  • 535
  • Pages: 130-137

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 486
  • Pages: 95-103

PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 1
  • 582
  • Pages: 121-131

METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 3
  • 552
  • Pages: 110-120

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 614
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 5
  • 672
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 5
  • 622
  • Pages: 9-19

Development of reflexive and predictive competencies of information security specialists as a factor in improving the quality of professional education

Specialist training
  • Year: 2024
  • Issue: 1
  • 0
  • 575
  • Pages: 168-174

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 585
  • Pages: 134-141

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 659
  • Pages: 51-57

IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 592
  • Pages: 41-50

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 6
  • 616
  • Pages: 32-40

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 622
  • Pages: 18-31

Accounting for the impact of the human factor in cyber security models

Information security application
  • Year: 2023
  • Issue: 2
  • 3
  • 619
  • Pages: 27-36

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 14
  • 684
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 612
  • Pages: 80-95

Criteria used to assess the quality of information security systems

Quality assessment and software systems support
  • Year: 2023
  • Issue: 1
  • 1
  • 575
  • Pages: 139-147

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 600
  • Pages: 70-79

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 605
  • Pages: 50-61

Forming the culture of digital security of students of higher educational institutions of shipbuilding profile

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 570
  • Pages: 54-61

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 635
  • Pages: 36-49

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 609
  • Pages: 28-35

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 673
  • Pages: 168-178

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 6
  • 647
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 651
  • Pages: 124-133

Automated security analysis of software for the Android operating system

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 609
  • Pages: 112-123

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 661
  • Pages: 69-81

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 5
  • 701
  • Pages: 34-47

The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 659
  • Pages: 131-142

Protection of blockchain systems of smart cities against a selfish mining attack

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 3
  • 638
  • Pages: 60-70

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 4
  • 655
  • Pages: 35-40

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 10
  • 800
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 10
  • 698
  • Pages: 9-20

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 652
  • Pages: 132-144

A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 7
  • 707
  • Pages: 121-131

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 7
  • 715
  • Pages: 83-96

Global practices in regulating and implementing generative artificial intelligence in higher education

Specialist training
  • Year: 2025
  • Issue: 3
  • 32
  • 896
  • Pages: 192-212

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 2
  • 709
  • Pages: 165-179

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 712
  • Pages: 91-99

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 8
  • 766
  • Pages: 69-80

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 7
  • 754
  • Pages: 40-54

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 21
  • 857
  • Pages: 30-39

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 10
  • 733
  • Pages: 59-68

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 14
  • 784
  • Pages: 9-20