Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Network and telecommunication security"
Method for ensuring data integrity in edge computing networks based on blockchain technology
- Year: 2023
- Issue: 4
- 1
- 193
- Pages: 95-104
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
- Year: 2023
- Issue: 3
- 1
- 201
- Pages: 117-125
A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity
- Year: 2023
- Issue: 3
- 1
- 194
- Pages: 103-116
Agent-based modelling information distribution in social-information internet services
- Year: 2023
- Issue: 3
- 0
- 190
- Pages: 90-102
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
- Year: 2023
- Issue: 3
- 0
- 186
- Pages: 82-89
Decentralized messaging systems architecture stability analysis
- Year: 2023
- Issue: 2
- 0
- 238
- Pages: 73-81
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 198
- Pages: 61-72
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 296
- Pages: 74-81
Security threat model of network domain name service when implementing attacking scenarios
- Year: 2021
- Issue: 2
- 0
- 338
- Pages: 65-73
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 346
- Pages: 57-64
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 338
- Pages: 48-56
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 2
- 337
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 352
- Pages: 21-40
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 0
- 329
- Pages: 79-85
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 320
- Pages: 62-78
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 3
- 334
- Pages: 55-61
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 1
- 365
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 320
- Pages: 39-49
Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks
- Year: 2021
- Issue: 1
- 1
- 314
- Pages: 20-30
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 2
- 323
- Pages: 39-50
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 0
- 319
- Pages: 63-73
Research of information security audit problems of geographically distributed devices of the Internet of Things
- Year: 2024
- Issue: 4
- 0
- 331
- Pages: 42-52
Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation
- Year: 2024
- Issue: 4
- 0
- 301
- Pages: 33-41
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 484
- Pages: 51-57
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 4
- 466
- Pages: 86-95
Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework
- Year: 2025
- Issue: 2
- 9
- 498
- Pages: 71-85
Protection of blockchain systems of smart cities against a selfish mining attack
- Year: 2025
- Issue: 2
- 3
- 464
- Pages: 60-70
Anonymization of network traffic in blockchain systems by using garlic routing
- Year: 2025
- Issue: 1
- 3
- 506
- Pages: 145-154
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 495
- Pages: 132-144
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
- Year: 2025
- Issue: 1
- 5
- 536
- Pages: 121-131
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 5
- 552
- Pages: 69-80
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
- Year: 2025
- Issue: 3
- 6
- 574
- Pages: 55-68