Publication schedule
-
№1 March 2026
Articles by keywords "security"
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 0
- 16
- Pages: 123-133
Adaptive architecture for secure remote access to corporate hosting services
- Year: 2026
- Issue: 1
- 1
- 18
- Pages: 99-108
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 0
- 21
- Pages: 69-86
Method for ensuring data integrity in edge computing networks based on blockchain technology
- Year: 2023
- Issue: 4
- 2
- 369
- Pages: 95-104
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 1
- 347
- Pages: 19-30
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 0
- 349
- Pages: 9-18
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 363
- Pages: 154-169
Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation
- Year: 2023
- Issue: 3
- 1
- 355
- Pages: 126-137
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
- Year: 2023
- Issue: 3
- 1
- 363
- Pages: 117-125
SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION
- Year: 2022
- Issue: 4
- 0
- 354
- Pages: 20-27
EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 4
- 1
- 345
- Pages: 9-19
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 336
- Pages: 155-166
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 350
- Pages: 36-44
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 343
- Pages: 9-23
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 368
- Pages: 25-32
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
- Year: 2023
- Issue: 2
- 1
- 358
- Pages: 150-162
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 370
- Pages: 61-72
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 397
- Pages: 137-144
Segmenting data samples for Internet of Things devices security state analysis
- Year: 2021
- Issue: 3
- 0
- 381
- Pages: 130-136
Using contradictions in data to search implicit failures in computer systems
- Year: 2021
- Issue: 3
- 0
- 411
- Pages: 63-71
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 418
- Pages: 9-15
Authentication of electronic vehicle control units based on hidden channels
- Year: 2025
- Issue: 4
- 14
- 468
- Pages: 59-75
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 3
- 447
- Pages: 48-58
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 18
- 437
- Pages: 23-34
Cyber-physical systems sustainability based on graph theory
- Year: 2021
- Issue: 2
- 0
- 470
- Pages: 145-150
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 1
- 501
- Pages: 127-134
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 3
- 469
- Pages: 118-126
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 526
- Pages: 109-117
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 535
- Pages: 21-40
Security through obscurity in industrial Internet of Things
- Year: 2021
- Issue: 1
- 0
- 477
- Pages: 131-137
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 591
- Pages: 117-130
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 2
- 509
- Pages: 109-116
Conceptual model of geoinformation system adaptive control under conditions of destabilization
- Year: 2021
- Issue: 1
- 0
- 529
- Pages: 102-108
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 3
- 505
- Pages: 55-61
Distributed ledger technologies application to audit and investigate incidents in big data processing systems
- Year: 2021
- Issue: 4
- 0
- 474
- Pages: 144-156
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 455
- Pages: 91-100
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 479
- Pages: 157-164
Verification of access control in big data systems using temporal logics
- Year: 2024
- Issue: Спецвыпуск
- 1
- 491
- Pages: 146-156
Assessment of the descriptive ability of modern data sources for analyzing cyber security threats
- Year: 2024
- Issue: Спецвыпуск
- 0
- 487
- Pages: 129-145
Protection of ad-hoc networks against distributed scanning from the Internet
- Year: 2024
- Issue: Спецвыпуск
- 0
- 490
- Pages: 118-128
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 481
- Pages: 104-117
Method for searching for clones of program code in binary executable files
- Year: 2024
- Issue: Спецвыпуск
- 0
- 493
- Pages: 46-55
Formal statement of the problem of morphizing executive code during the work of software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 463
- Pages: 17-23
A concept of the protected distributed ledger technology for smart city digital environment
- Year: 2024
- Issue: Спецвыпуск
- 3
- 495
- Pages: 10-16
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 491
- Pages: 22-32
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 509
- Pages: 9-21
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 479
- Pages: 142-154
Application of distributed ledger technology to protect smart city information systems
- Year: 2024
- Issue: 3
- 3
- 523
- Pages: 69-79
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 544
- Pages: 30-39
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 14
- 599
- Pages: 138-151
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 535
- Pages: 130-137
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 486
- Pages: 95-103
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 3
- 552
- Pages: 110-120
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 614
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 672
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 585
- Pages: 134-141
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 659
- Pages: 51-57
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 6
- 616
- Pages: 32-40
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 622
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 3
- 619
- Pages: 27-36
Criteria used to assess the quality of information security systems
- Year: 2023
- Issue: 1
- 1
- 575
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 600
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 2
- 605
- Pages: 50-61
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 609
- Pages: 28-35
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 4
- 673
- Pages: 168-178
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 6
- 647
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 651
- Pages: 124-133
Automated security analysis of software for the Android operating system
- Year: 2025
- Issue: Спецвыпуск
- 4
- 609
- Pages: 112-123
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 3
- 661
- Pages: 69-81
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 5
- 701
- Pages: 34-47
The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems
- Year: 2025
- Issue: 2
- 5
- 659
- Pages: 131-142
Protection of blockchain systems of smart cities against a selfish mining attack
- Year: 2025
- Issue: 2
- 3
- 638
- Pages: 60-70
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 4
- 655
- Pages: 35-40
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 10
- 800
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 652
- Pages: 132-144
Global practices in regulating and implementing generative artificial intelligence in higher education
- Year: 2025
- Issue: 3
- 32
- 896
- Pages: 192-212
Optimization of data obfuscation in big data processing and storage systems
- Year: 2025
- Issue: 3
- 2
- 709
- Pages: 165-179
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 8
- 766
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 21
- 857
- Pages: 30-39
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 10
- 733
- Pages: 59-68
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 14
- 784
- Pages: 9-20