Articles from section "Network and telecommunication security"

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 0
  • 15
  • Pages: 51-57

IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 0
  • 15
  • Pages: 41-50

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 1
  • 37
  • Pages: 86-95

Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 2
  • 41
  • Pages: 71-85

Protection of blockchain systems of smart cities against a selfish mining attack

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 0
  • 35
  • Pages: 60-70

Anonymization of network traffic in blockchain systems by using garlic routing

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 56
  • Pages: 145-154

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 61
  • Pages: 132-144

A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 58
  • Pages: 121-131

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 2
  • 91
  • Pages: 69-80

Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 0
  • 82
  • Pages: 55-68

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 0
  • 81
  • Pages: 40-54