Articles by keywords "security"
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 14
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 0
- 14
- Pages: 20-30
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 0
- 16
- Pages: 134-141
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 0
- 16
- Pages: 51-57
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 0
- 16
- Pages: 32-40
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 16
- Pages: 18-31
ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS
- Year: 2023
- Issue: 2
- 0
- 17
- Pages: 27-36
CRITERIA USED TO ASSESS THE QUALITY OF INFORMATION SECURITY SYSTEMS
- Year: 2023
- Issue: 1
- 0
- 16
- Pages: 139-147
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 0
- 17
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 0
- 19
- Pages: 50-61
FORMING THE CULTURE OF DIGITAL SECURITY OF STUDENTS OF HIGHER EDUCATIONAL INSTITUTIONS OF SHIPBUILDING PROFILE
- Year: 2023
- Issue: 1
- 0
- 17
- Pages: 54-61
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 0
- 18
- Pages: 28-35
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 3
- 35
- Pages: 168-178
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 0
- 26
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 27
- Pages: 124-133
Automated security analysis of software for the Android operating system
- Year: 2025
- Issue: Спецвыпуск
- 0
- 25
- Pages: 112-123
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 0
- 25
- Pages: 69-81
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 25
- Pages: 34-47
Protection of blockchain systems of smart cities against a selfish mining attack
- Year: 2025
- Issue: 2
- 0
- 36
- Pages: 60-70
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 39
- Pages: 35-40
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 0
- 42
- Pages: 21-34
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 62
- Pages: 132-144
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 3
- 79
- Pages: 83-96
Global practices in regulating and implementing generative artificial intelligence in higher education
- Year: 2025
- Issue: 3
- 2
- 99
- Pages: 192-212
Optimization of data obfuscation in big data processing and storage systems
- Year: 2025
- Issue: 3
- 0
- 82
- Pages: 165-179
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 2
- 92
- Pages: 69-80
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 0
- 92
- Pages: 30-39
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 1
- 91
- Pages: 59-68
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 1
- 100
- Pages: 9-20