Publication schedule
  • №1 March 2026

Articles from section "Network and telecommunication security"

Multi-level model of secure interoperability in e-commerce based on a security profile

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 12
  • Pages: 123-133

The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 12
  • Pages: 109-122

Adaptive architecture for secure remote access to corporate hosting services

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 1
  • 14
  • Pages: 99-108

Analysis of information security issues in hyperconvergent infrastructure

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 14
  • Pages: 87-98

Decentralized messaging systems threat model

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 0
  • 355
  • Pages: 105-115

Method for ensuring data integrity in edge computing networks based on blockchain technology

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 2
  • 367
  • Pages: 95-104

Attack detection by artificial neural networks

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 1
  • 375
  • Pages: 84-94

Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 361
  • Pages: 117-125

A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 369
  • Pages: 103-116

Agent-based modelling information distribution in social-information internet services

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 374
  • Pages: 90-102

Ranking model of the system of compromise indicators of nodes of a corporate data transmission network

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 349
  • Pages: 82-89

Decentralized messaging systems architecture stability analysis

Network and telecommunication security
  • Year: 2023
  • Issue: 2
  • 0
  • 442
  • Pages: 73-81

Methods of monitoring the execution of the security pattern in infocommunication systems

Network and telecommunication security
  • Year: 2023
  • Issue: 2
  • 0
  • 368
  • Pages: 61-72

Fake posts detection using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 3
  • 3
  • 445
  • Pages: 34-43

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 460
  • Pages: 74-81

Security threat model of network domain name service when implementing attacking scenarios

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 523
  • Pages: 65-73

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 528
  • Pages: 57-64

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 533
  • Pages: 48-56

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 3
  • 519
  • Pages: 41-47

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 533
  • Pages: 21-40

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 505
  • Pages: 79-85

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 505
  • Pages: 62-78

Approach to detect maliscous servers on anonimous network TOR based on clasterization methods

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 3
  • 503
  • Pages: 55-61

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 550
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 494
  • Pages: 39-49

Dynamic phishing website dataset collection

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 513
  • Pages: 31-38

Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 479
  • Pages: 20-30

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 2
  • 502
  • Pages: 39-50

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 1
  • 493
  • Pages: 63-73

Covert storage channels in the TLS protocol

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 524
  • Pages: 53-62

Research of information security audit problems of geographically distributed devices of the Internet of Things

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 499
  • Pages: 42-52

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 1
  • 456
  • Pages: 33-41

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 657
  • Pages: 51-57

IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 590
  • Pages: 41-50

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 4
  • 633
  • Pages: 86-95

Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 10
  • 684
  • Pages: 71-85

Protection of blockchain systems of smart cities against a selfish mining attack

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 3
  • 636
  • Pages: 60-70

Anonymization of network traffic in blockchain systems by using garlic routing

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 4
  • 682
  • Pages: 145-154

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 650
  • Pages: 132-144

A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 7
  • 705
  • Pages: 121-131

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 8
  • 764
  • Pages: 69-80

Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 7
  • 760
  • Pages: 55-68

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 7
  • 752
  • Pages: 40-54