Articles from section "Information security application"

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 9
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 10
  • Pages: 44-56

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 10
  • Pages: 31-43

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 14
  • Pages: 18-31

ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 15
  • Pages: 27-36

USING BOTNET COORDINATION DETECTION TO DETECT SOCIAL INFORMATION CAMPAIGNS

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 14
  • Pages: 17-26

EVALUATION OF SIGNAL MASKING BY A TWO-COMPONENT STEGANOGRAPHIC SYSTEM IN WINDOWED INFORMATION PROCESSING

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 14
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 15
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 15
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 14
  • Pages: 62-69

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 17
  • Pages: 50-61

FORMING THE CULTURE OF DIGITAL SECURITY OF STUDENTS OF HIGHER EDUCATIONAL INSTITUTIONS OF SHIPBUILDING PROFILE

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 15
  • Pages: 54-61

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 36-49

ANALYSIS OF THE INTERNATIONAL STANDARD ISO 27701 AND THE FORMATION OF RECOMMENDATIONS FOR ITS USE

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 14
  • Pages: 45-53

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 28-35

A METHOD FOR DETECTING MANIPULATION ATTACKS ON RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 14
  • Pages: 37-45

MOBILE DEVICE USER DATA PROTECTION APPROACH BASED ON MULTI-FACTOR AUTHENTICATION, VISUAL CRYPTOGRAPHY AND STEGANOGRAPHY

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 16
  • Pages: 25-36

METHOD FOR DETECTING FALSE INFORMATION FROM SOCIAL INFORMATION SERVICES USING THE REALITY PARAMETER

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 15
  • Pages: 17-25

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 18-27

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 1
  • 20
  • Pages: 9-17

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 9-17

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 42
  • Pages: 41-59

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 38
  • Pages: 35-40

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 41
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 4
  • 53
  • Pages: 9-20