Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Information security application"
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 0
- 9
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 10
- Pages: 31-43
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
- Year: 2022
- Issue: 1
- 0
- 14
- Pages: 18-31
ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS
- Year: 2023
- Issue: 2
- 0
- 15
- Pages: 27-36
USING BOTNET COORDINATION DETECTION TO DETECT SOCIAL INFORMATION CAMPAIGNS
- Year: 2023
- Issue: 2
- 0
- 14
- Pages: 17-26
EVALUATION OF SIGNAL MASKING BY A TWO-COMPONENT STEGANOGRAPHIC SYSTEM IN WINDOWED INFORMATION PROCESSING
- Year: 2023
- Issue: 2
- 0
- 14
- Pages: 9-16
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 0
- 15
- Pages: 70-79
Protection against unauthorized access to mobile devices when applying of the BYOD concept
- Year: 2024
- Issue: 1
- 0
- 17
- Pages: 50-61
FORMING THE CULTURE OF DIGITAL SECURITY OF STUDENTS OF HIGHER EDUCATIONAL INSTITUTIONS OF SHIPBUILDING PROFILE
- Year: 2023
- Issue: 1
- 0
- 15
- Pages: 54-61
ANALYSIS OF THE INTERNATIONAL STANDARD ISO 27701 AND THE FORMATION OF RECOMMENDATIONS FOR ITS USE
- Year: 2023
- Issue: 1
- 0
- 14
- Pages: 45-53
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 0
- 16
- Pages: 28-35
A METHOD FOR DETECTING MANIPULATION ATTACKS ON RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING
- Year: 2023
- Issue: 1
- 0
- 14
- Pages: 37-45
MOBILE DEVICE USER DATA PROTECTION APPROACH BASED ON MULTI-FACTOR AUTHENTICATION, VISUAL CRYPTOGRAPHY AND STEGANOGRAPHY
- Year: 2023
- Issue: 1
- 0
- 16
- Pages: 25-36
METHOD FOR DETECTING FALSE INFORMATION FROM SOCIAL INFORMATION SERVICES USING THE REALITY PARAMETER
- Year: 2023
- Issue: 1
- 0
- 15
- Pages: 17-25
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 0
- 16
- Pages: 18-27
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 1
- 20
- Pages: 9-17
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 16
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 0
- 42
- Pages: 41-59
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 38
- Pages: 35-40
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 0
- 41
- Pages: 21-34