Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Information security application"
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
- Year: 2023
- Issue: 4
- 6
- 194
- Pages: 48-60
Method of embedding hidden data in message stream with error-correcting coding
- Year: 2023
- Issue: 4
- 1
- 197
- Pages: 42-47
Combinational coding of data taking into account the analysis of the value of the information contained
- Year: 2023
- Issue: 4
- 1
- 171
- Pages: 31-41
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 0
- 180
- Pages: 19-30
IMITATIONAL SOFTWARE PACKAGE FOR RESEARCHING HIGHLY DETECTABLE STEGOSYSTEMS – HUGO SYSTEMS
- Year: 2022
- Issue: 4
- 1
- 171
- Pages: 53-63
IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS
- Year: 2022
- Issue: 4
- 1
- 173
- Pages: 43-52
CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM
- Year: 2022
- Issue: 4
- 0
- 172
- Pages: 35-42
METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS
- Year: 2022
- Issue: 4
- 1
- 181
- Pages: 28-34
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 184
- Pages: 36-44
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 183
- Pages: 9-23
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 203
- Pages: 25-32
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 7
- 250
- Pages: 23-34
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 352
- Pages: 58-68
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 409
- Pages: 20-29
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 450
- Pages: 9-19
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 447
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 447
- Pages: 31-43
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 446
- Pages: 18-31
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 1
- 438
- Pages: 27-36
Using botnet coordination detection to detect social information campaigns
- Year: 2023
- Issue: 2
- 1
- 419
- Pages: 17-26
Evaluation of signal masking by a two-component steganographic system in windowed information processing
- Year: 2023
- Issue: 2
- 2
- 417
- Pages: 9-16
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 440
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 1
- 434
- Pages: 50-61
Forming the culture of digital security of students of higher educational institutions of shipbuilding profile
- Year: 2023
- Issue: 1
- 0
- 416
- Pages: 54-61
Analysis of the international standard ISO 27701 and the formation of recommendations for its use
- Year: 2023
- Issue: 1
- 2
- 411
- Pages: 46-53
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 445
- Pages: 28-35
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 411
- Pages: 37-45
Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography
- Year: 2023
- Issue: 1
- 2
- 441
- Pages: 26-36
Method for detecting false information from social information services using the reality parameter
- Year: 2023
- Issue: 1
- 0
- 399
- Pages: 17-25
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 6
- 484
- Pages: 18-27
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 3
- 446
- Pages: 9-16
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 441
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 6
- 504
- Pages: 41-59
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 475
- Pages: 35-40
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 6
- 555
- Pages: 21-34