Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Information security application"
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 128
- Pages: 58-68
ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS
- Year: 2022
- Issue: 2
- 1
- 187
- Pages: 20-29
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 205
- Pages: 9-19
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 207
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 209
- Pages: 31-43
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 214
- Pages: 18-31
ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS
- Year: 2023
- Issue: 2
- 1
- 209
- Pages: 27-36
USING BOTNET COORDINATION DETECTION TO DETECT SOCIAL INFORMATION CAMPAIGNS
- Year: 2023
- Issue: 2
- 1
- 210
- Pages: 17-26
EVALUATION OF SIGNAL MASKING BY A TWO-COMPONENT STEGANOGRAPHIC SYSTEM IN WINDOWED INFORMATION PROCESSING
- Year: 2023
- Issue: 2
- 0
- 204
- Pages: 9-16
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 212
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 1
- 207
- Pages: 50-61
Forming the culture of digital security of students of higher educational institutions of shipbuilding profile
- Year: 2023
- Issue: 1
- 0
- 205
- Pages: 54-61
Analysis of the international standard ISO 27701 and the formation of recommendations for its use
- Year: 2023
- Issue: 1
- 2
- 205
- Pages: 45-53
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 1
- 211
- Pages: 28-35
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 199
- Pages: 37-45
Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography
- Year: 2023
- Issue: 1
- 2
- 209
- Pages: 25-36
Method for detecting false information from social information services using the reality parameter
- Year: 2023
- Issue: 1
- 0
- 196
- Pages: 17-25
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 3
- 235
- Pages: 18-27
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 1
- 213
- Pages: 9-17
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 215
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 5
- 261
- Pages: 41-59
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 242
- Pages: 35-40
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 3
- 268
- Pages: 21-34