Articles from section "Information security application"

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 1
  • 76
  • Pages: 9-19

Ways to obtain evidential information from a computer using Open Source

Information security application
  • Year: 2024
  • Issue: 3
  • 2
  • 128
  • Pages: 58-68

Security assessment of Big Data systems

Information security application
  • Year: 2024
  • Issue: 3
  • 2
  • 109
  • Pages: 40-57

ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 187
  • Pages: 20-29

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 205
  • Pages: 9-19

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 207
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 218
  • Pages: 44-56

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 209
  • Pages: 31-43

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 214
  • Pages: 18-31

ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 209
  • Pages: 27-36

USING BOTNET COORDINATION DETECTION TO DETECT SOCIAL INFORMATION CAMPAIGNS

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 210
  • Pages: 17-26

EVALUATION OF SIGNAL MASKING BY A TWO-COMPONENT STEGANOGRAPHIC SYSTEM IN WINDOWED INFORMATION PROCESSING

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 204
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 215
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 212
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 218
  • Pages: 62-69

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 207
  • Pages: 50-61

Forming the culture of digital security of students of higher educational institutions of shipbuilding profile

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 205
  • Pages: 54-61

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 215
  • Pages: 36-49

Analysis of the international standard ISO 27701 and the formation of recommendations for its use

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 205
  • Pages: 45-53

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 211
  • Pages: 28-35

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 199
  • Pages: 37-45

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 209
  • Pages: 25-36

Method for detecting false information from social information services using the reality parameter

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 196
  • Pages: 17-25

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 235
  • Pages: 18-27

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 1
  • 213
  • Pages: 9-17

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 215
  • Pages: 9-17

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 5
  • 261
  • Pages: 41-59

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 242
  • Pages: 35-40

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 3
  • 268
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 262
  • Pages: 9-20