Articles from section "Information security application"

A method of responding to targeted attacks based on the mapping of information security events using indication signatures

Information security application
  • Year: 2023
  • Issue: 4
  • 6
  • 194
  • Pages: 48-60

Method of embedding hidden data in message stream with error-correcting coding

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 197
  • Pages: 42-47

Combinational coding of data taking into account the analysis of the value of the information contained

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 171
  • Pages: 31-41

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 0
  • 180
  • Pages: 19-30

IMITATIONAL SOFTWARE PACKAGE FOR RESEARCHING HIGHLY DETECTABLE STEGOSYSTEMS – HUGO SYSTEMS

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 171
  • Pages: 53-63

IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 173
  • Pages: 43-52

CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM

Information security application
  • Year: 2022
  • Issue: 4
  • 0
  • 172
  • Pages: 35-42

METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 181
  • Pages: 28-34

METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 184
  • Pages: 36-44

MATHEMATICAL MODEL AND ALGORITHM FOR DATA INTEGRITY CONTROL BASED ON THE RULES OF CODE CONSTRUCTION WITH UNEQUAL CHARACTER PROTECTION

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 183
  • Pages: 24-35

INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 183
  • Pages: 9-23

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 188
  • Pages: 33-57

Improving the quality of information security state identification based on sample segmentation

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 203
  • Pages: 25-32

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 2
  • 215
  • Pages: 9-24

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 7
  • 250
  • Pages: 23-34

Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks

Information security application
  • Year: 2025
  • Issue: 4
  • 18
  • 318
  • Pages: 9-22

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 1
  • 322
  • Pages: 9-19

Ways to obtain evidential information from a computer using Open Source

Information security application
  • Year: 2024
  • Issue: 3
  • 2
  • 352
  • Pages: 58-68

Security assessment of Big Data systems

Information security application
  • Year: 2024
  • Issue: 3
  • 4
  • 354
  • Pages: 40-57

ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 409
  • Pages: 20-29

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 450
  • Pages: 9-19

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 447
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 3
  • 437
  • Pages: 44-56

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 447
  • Pages: 31-43

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 446
  • Pages: 18-31

Accounting for the impact of the human factor in cyber security models

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 438
  • Pages: 27-36

Using botnet coordination detection to detect social information campaigns

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 419
  • Pages: 17-26

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2023
  • Issue: 2
  • 2
  • 417
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 449
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 440
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 447
  • Pages: 62-69

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 434
  • Pages: 50-61

Forming the culture of digital security of students of higher educational institutions of shipbuilding profile

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 416
  • Pages: 54-61

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 461
  • Pages: 36-49

Analysis of the international standard ISO 27701 and the formation of recommendations for its use

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 411
  • Pages: 46-53

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 445
  • Pages: 28-35

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 411
  • Pages: 37-45

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 441
  • Pages: 26-36

Method for detecting false information from social information services using the reality parameter

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 399
  • Pages: 17-25

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 6
  • 484
  • Pages: 18-27

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 446
  • Pages: 9-16

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 441
  • Pages: 9-17

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 504
  • Pages: 41-59

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 475
  • Pages: 35-40

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 555
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 8
  • 521
  • Pages: 9-20