Articles by keywords "security threats"

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 7
  • 322
  • Pages: 187-200

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 528
  • Pages: 19-30

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 3
  • 568
  • Pages: 9-24

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 614
  • Pages: 118-129

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 24
  • 636
  • Pages: 23-34

Assessment of the descriptive ability of modern data sources for analyzing cyber security threats

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 661
  • Pages: 129-145

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 25
  • 847
  • Pages: 138-151

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 20
  • 879
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 815
  • Pages: 80-95