Publication schedule
  • №1 March 2026

Articles by keywords "threats"

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 0
  • 14
  • Pages: 187-200

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 347
  • Pages: 19-30

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 3
  • 378
  • Pages: 9-24

Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities

Critical information infrastructure security
  • Year: 2023
  • Issue: 2
  • 0
  • 394
  • Pages: 92-106

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 414
  • Pages: 118-129

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 23
  • 595
  • Pages: 138-162

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 18
  • 437
  • Pages: 23-34

Assessment of the descriptive ability of modern data sources for analyzing cyber security threats

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 487
  • Pages: 129-145

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 14
  • 599
  • Pages: 138-151

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 14
  • 684
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 612
  • Pages: 80-95

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 24
  • 799
  • Pages: 147-164