Latest issues
- 2026, Issue 1
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
Articles from section "Cyber-physic systems security"
Automation of water transport activities using factorial approach to risk managemen
- Year: 2026
- Issue: 1
- 2
- 234
- Pages: 168-175
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
- Year: 2026
- Issue: 1
- 11
- 288
- Pages: 152-167
THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES
- Year: 2022
- Issue: 3
- 2
- 516
- Pages: 80-89
Method of cyberphysical system topology reconfiguration based on graph artificial neural network
- Year: 2023
- Issue: 2
- 0
- 541
- Pages: 173-182
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
- Year: 2023
- Issue: 2
- 0
- 529
- Pages: 163-172
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
- Year: 2023
- Issue: 2
- 1
- 539
- Pages: 150-162
Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things
- Year: 2023
- Issue: 2
- 0
- 520
- Pages: 140-149
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 538
- Pages: 123-139
Cyber resiliency support based on methods of graph analysis and functional network virtualization
- Year: 2023
- Issue: 2
- 0
- 529
- Pages: 107-122
Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring
- Year: 2021
- Issue: 3
- 1
- 621
- Pages: 145-156
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 604
- Pages: 137-144
Segmenting data samples for Internet of Things devices security state analysis
- Year: 2021
- Issue: 3
- 0
- 577
- Pages: 130-136
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 590
- Pages: 108-117
Authentication of electronic vehicle control units based on hidden channels
- Year: 2025
- Issue: 4
- 16
- 664
- Pages: 59-75
Method of determining the criticality of elements of a complex technical system
- Year: 2025
- Issue: 4
- 4
- 641
- Pages: 48-58
A model for implementing artificial intelligence into embedded systems
- Year: 2025
- Issue: 4
- 15
- 638
- Pages: 35-47
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 642
- Pages: 91-100
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
- Year: 2024
- Issue: 3
- 1
- 678
- Pages: 94-108
An integral indicator of the effectiveness of the use of a group of unmanned aerial vehicles in solving aerial photography tasks
- Year: 2024
- Issue: 3
- 0
- 707
- Pages: 88-93
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 766
- Pages: 96-109