Publication schedule
-
№1 March 2026
Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Network and telecommunication security"
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 0
- 12
- Pages: 123-133
The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions
- Year: 2026
- Issue: 1
- 0
- 12
- Pages: 109-122
Adaptive architecture for secure remote access to corporate hosting services
- Year: 2026
- Issue: 1
- 1
- 14
- Pages: 99-108
Analysis of information security issues in hyperconvergent infrastructure
- Year: 2026
- Issue: 1
- 0
- 14
- Pages: 87-98
Method for ensuring data integrity in edge computing networks based on blockchain technology
- Year: 2023
- Issue: 4
- 2
- 367
- Pages: 95-104
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
- Year: 2023
- Issue: 3
- 1
- 361
- Pages: 117-125
A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity
- Year: 2023
- Issue: 3
- 1
- 369
- Pages: 103-116
Agent-based modelling information distribution in social-information internet services
- Year: 2023
- Issue: 3
- 0
- 374
- Pages: 90-102
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
- Year: 2023
- Issue: 3
- 1
- 349
- Pages: 82-89
Decentralized messaging systems architecture stability analysis
- Year: 2023
- Issue: 2
- 0
- 442
- Pages: 73-81
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 368
- Pages: 61-72
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 460
- Pages: 74-81
Security threat model of network domain name service when implementing attacking scenarios
- Year: 2021
- Issue: 2
- 1
- 523
- Pages: 65-73
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 528
- Pages: 57-64
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 533
- Pages: 48-56
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 3
- 519
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 533
- Pages: 21-40
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 1
- 505
- Pages: 79-85
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 505
- Pages: 62-78
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
- Year: 2021
- Issue: 1
- 3
- 503
- Pages: 55-61
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 1
- 550
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 494
- Pages: 39-49
Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks
- Year: 2021
- Issue: 1
- 1
- 479
- Pages: 20-30
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 2
- 502
- Pages: 39-50
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 1
- 493
- Pages: 63-73
Research of information security audit problems of geographically distributed devices of the Internet of Things
- Year: 2024
- Issue: 4
- 0
- 499
- Pages: 42-52
Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation
- Year: 2024
- Issue: 4
- 1
- 456
- Pages: 33-41
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 657
- Pages: 51-57
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 4
- 633
- Pages: 86-95
Location privacy and security in self-driving vehicles: a ZKP-enhanced ECDDH based authentication framework
- Year: 2025
- Issue: 2
- 10
- 684
- Pages: 71-85
Protection of blockchain systems of smart cities against a selfish mining attack
- Year: 2025
- Issue: 2
- 3
- 636
- Pages: 60-70
Anonymization of network traffic in blockchain systems by using garlic routing
- Year: 2025
- Issue: 1
- 4
- 682
- Pages: 145-154
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 650
- Pages: 132-144
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
- Year: 2025
- Issue: 1
- 7
- 705
- Pages: 121-131
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 8
- 764
- Pages: 69-80
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
- Year: 2025
- Issue: 3
- 7
- 760
- Pages: 55-68