Publication schedule
-
№1 March 2026
Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Information security application"
Evaluation of signal masking by a two-component steganographic system in windowed information processing
- Year: 2026
- Issue: 1
- 0
- 16
- Pages: 9-14
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
- Year: 2023
- Issue: 4
- 13
- 397
- Pages: 48-60
Method of embedding hidden data in message stream with error-correcting coding
- Year: 2023
- Issue: 4
- 2
- 378
- Pages: 42-47
Combinational coding of data taking into account the analysis of the value of the information contained
- Year: 2023
- Issue: 4
- 2
- 348
- Pages: 31-41
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 1
- 347
- Pages: 19-30
IMITATIONAL SOFTWARE PACKAGE FOR RESEARCHING HIGHLY DETECTABLE STEGOSYSTEMS – HUGO SYSTEMS
- Year: 2022
- Issue: 4
- 1
- 328
- Pages: 53-63
IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS
- Year: 2022
- Issue: 4
- 2
- 346
- Pages: 43-52
CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM
- Year: 2022
- Issue: 4
- 1
- 321
- Pages: 35-42
METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS
- Year: 2022
- Issue: 4
- 1
- 351
- Pages: 28-34
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 350
- Pages: 36-44
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 343
- Pages: 9-23
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 368
- Pages: 25-32
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 18
- 437
- Pages: 23-34
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 520
- Pages: 58-68
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 559
- Pages: 20-29
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 624
- Pages: 9-19
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 610
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 614
- Pages: 31-43
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 622
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 3
- 619
- Pages: 27-36
Using botnet coordination detection to detect social information campaigns
- Year: 2023
- Issue: 2
- 1
- 577
- Pages: 17-26
Evaluation of signal masking by a two-component steganographic system in windowed information processing
- Year: 2023
- Issue: 2
- 2
- 581
- Pages: 9-16
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 600
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 2
- 605
- Pages: 50-61
Forming the culture of digital security of students of higher educational institutions of shipbuilding profile
- Year: 2023
- Issue: 1
- 0
- 570
- Pages: 54-61
Analysis of the international standard ISO 27701 and the formation of recommendations for its use
- Year: 2023
- Issue: 1
- 8
- 587
- Pages: 46-53
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 609
- Pages: 28-35
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 563
- Pages: 37-45
Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography
- Year: 2023
- Issue: 1
- 2
- 596
- Pages: 26-36
Method for detecting false information from social information services using the reality parameter
- Year: 2023
- Issue: 1
- 0
- 556
- Pages: 17-25
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 6
- 661
- Pages: 18-27
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 3
- 617
- Pages: 9-16
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 607
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 7
- 734
- Pages: 41-59
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 4
- 655
- Pages: 35-40
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 10
- 800
- Pages: 21-34