Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Network and telecommunication security"
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 70
- Pages: 74-81
Security threat model of network domain name service when implementing attacking scenarios
- Year: 2021
- Issue: 2
- 0
- 74
- Pages: 65-73
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 72
- Pages: 57-64
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 75
- Pages: 48-56
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 1
- 74
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 1
- 82
- Pages: 21-40
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 0
- 77
- Pages: 79-85
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 81
- Pages: 62-78
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 0
- 76
- Pages: 55-61
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 0
- 86
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 80
- Pages: 39-49
Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks
- Year: 2021
- Issue: 1
- 0
- 77
- Pages: 20-30
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 0
- 73
- Pages: 39-50
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 0
- 97
- Pages: 63-73
Research of information security audit problems of geographically distributed devices of the Internet of Things
- Year: 2024
- Issue: 4
- 0
- 102
- Pages: 42-52
Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation
- Year: 2024
- Issue: 4
- 0
- 96
- Pages: 33-41
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 222
- Pages: 51-57
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 3
- 239
- Pages: 86-95
Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework
- Year: 2025
- Issue: 2
- 7
- 261
- Pages: 71-85
Protection of blockchain systems of smart cities against a selfish mining attack
- Year: 2025
- Issue: 2
- 0
- 239
- Pages: 60-70
Anonymization of network traffic in blockchain systems by using garlic routing
- Year: 2025
- Issue: 1
- 2
- 261
- Pages: 145-154
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 259
- Pages: 132-144
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
- Year: 2025
- Issue: 1
- 2
- 294
- Pages: 121-131
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 5
- 300
- Pages: 69-80
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
- Year: 2025
- Issue: 3
- 3
- 318
- Pages: 55-68