Articles from section "Information security application"

A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions

Information security application
  • Year: 2026
  • Issue: 1
  • 15
  • 245
  • Pages: 15-30

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2026
  • Issue: 1
  • 7
  • 271
  • Pages: 9-14

A method of responding to targeted attacks based on the mapping of information security events using indication signatures

Information security application
  • Year: 2023
  • Issue: 4
  • 15
  • 590
  • Pages: 48-60

Method of embedding hidden data in message stream with error-correcting coding

Information security application
  • Year: 2023
  • Issue: 4
  • 2
  • 555
  • Pages: 42-47

Combinational coding of data taking into account the analysis of the value of the information contained

Information security application
  • Year: 2023
  • Issue: 4
  • 3
  • 534
  • Pages: 31-41

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 523
  • Pages: 19-30

IMITATIONAL SOFTWARE PACKAGE FOR RESEARCHING HIGHLY DETECTABLE STEGOSYSTEMS – HUGO SYSTEMS

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 499
  • Pages: 53-63

IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS

Information security application
  • Year: 2022
  • Issue: 4
  • 2
  • 517
  • Pages: 43-52

CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 485
  • Pages: 35-42

METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS

Information security application
  • Year: 2022
  • Issue: 4
  • 4
  • 538
  • Pages: 28-34

METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 523
  • Pages: 36-44

MATHEMATICAL MODEL AND ALGORITHM FOR DATA INTEGRITY CONTROL BASED ON THE RULES OF CODE CONSTRUCTION WITH UNEQUAL CHARACTER PROTECTION

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 509
  • Pages: 24-35

INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 513
  • Pages: 9-23

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 4
  • 566
  • Pages: 33-57

Improving the quality of information security state identification based on sample segmentation

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 547
  • Pages: 25-32

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 3
  • 563
  • Pages: 9-24

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 24
  • 629
  • Pages: 23-34

Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks

Information security application
  • Year: 2025
  • Issue: 4
  • 55
  • 801
  • Pages: 9-22

Data structures formation in active security monitoring tasks

Information security application
  • Year: 2021
  • Issue: 1
  • 2
  • 701
  • Pages: 9-19

Ways to obtain evidential information from a computer using Open Source

Information security application
  • Year: 2024
  • Issue: 3
  • 4
  • 708
  • Pages: 58-68

Security assessment of Big Data systems

Information security application
  • Year: 2024
  • Issue: 3
  • 4
  • 709
  • Pages: 40-57

ENSURING DATA INTEGRITY BASED ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 732
  • Pages: 20-29

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 825
  • Pages: 9-19

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 793
  • Pages: 57-65

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 6
  • 794
  • Pages: 44-56

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 805
  • Pages: 31-43

DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS

Information security application
  • Year: 2022
  • Issue: 1
  • 0
  • 793
  • Pages: 18-31

Accounting for the impact of the human factor in cyber security models

Information security application
  • Year: 2023
  • Issue: 2
  • 7
  • 817
  • Pages: 27-36

Using botnet coordination detection to detect social information campaigns

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 758
  • Pages: 17-26

Evaluation of signal masking by a two-component steganographic system in windowed information processing

Information security application
  • Year: 2023
  • Issue: 2
  • 2
  • 750
  • Pages: 9-16

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 807
  • Pages: 80-95

Graph self-regulation of various types of networks with adaptive topology

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 767
  • Pages: 70-79

The evaluation of the effectiveness of the functioning of a group of unmanned aerial vehicles when they perform aerial photography tasks

Information security application
  • Year: 2024
  • Issue: 1
  • 4
  • 813
  • Pages: 62-69

Protection against unauthorized access to mobile devices when applying of the BYOD concept

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 774
  • Pages: 50-61

Forming the culture of digital security of students of higher educational institutions of shipbuilding profile

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 746
  • Pages: 54-61

Cyber resilience of self-organizing cyber-physical systems

Information security application
  • Year: 2024
  • Issue: 1
  • 5
  • 823
  • Pages: 36-49

Analysis of the international standard ISO 27701 and the formation of recommendations for its use

Information security application
  • Year: 2023
  • Issue: 1
  • 11
  • 838
  • Pages: 46-53

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 773
  • Pages: 28-35

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 736
  • Pages: 37-45

Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography

Information security application
  • Year: 2023
  • Issue: 1
  • 2
  • 774
  • Pages: 26-36

Method for detecting false information from social information services using the reality parameter

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 717
  • Pages: 17-25

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 7
  • 834
  • Pages: 18-27

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 792
  • Pages: 9-16

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 792
  • Pages: 9-17

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 12
  • 1013
  • Pages: 41-59

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 842
  • Pages: 35-40

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 13
  • 1030
  • Pages: 21-34

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 14
  • 892
  • Pages: 9-20