Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Network and telecommunication security"
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 0
- 15
- Pages: 51-57
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 1
- 37
- Pages: 86-95
Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework
- Year: 2025
- Issue: 2
- 2
- 41
- Pages: 71-85
Protection of blockchain systems of smart cities against a selfish mining attack
- Year: 2025
- Issue: 2
- 0
- 35
- Pages: 60-70
Anonymization of network traffic in blockchain systems by using garlic routing
- Year: 2025
- Issue: 1
- 0
- 56
- Pages: 145-154
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 61
- Pages: 132-144
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 2
- 91
- Pages: 69-80
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
- Year: 2025
- Issue: 3
- 0
- 82
- Pages: 55-68