Articles by keywords "threats"

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 0
  • 140
  • Pages: 19-30

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 2
  • 172
  • Pages: 9-24

Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities

Critical information infrastructure security
  • Year: 2023
  • Issue: 2
  • 0
  • 161
  • Pages: 92-106

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 185
  • Pages: 118-129

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 15
  • 317
  • Pages: 138-162

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 4
  • 202
  • Pages: 23-34

Assessment of the descriptive ability of modern data sources for analyzing cyber security threats

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 269
  • Pages: 129-145

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 13
  • 366
  • Pages: 138-151

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 8
  • 420
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 409
  • Pages: 80-95

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 18
  • 566
  • Pages: 147-164