Content of 2nd issue of magazine «Voprosy kiberbezopasnosti» at 2021:
Title | Pages |
COGNITIVE MODELING OF THE CYBER ATTACK VECTOR BASED ON CAPEC METHODS
Vasilyev V.I., Kirillova A.D., Vulfin A.M. |
2-16 |
MODEL OF A “PHISHING” TYPE OF COMPUTER ATTACK ON A LOCAL COMPUTER NETWORK
Dobryshin M. M., Zakalkin P. V. |
17-25 |
TOPOLOGICAL METHODS OF ANALYSIS IN BEHAVIORAL ANALYTICS SYSTEMS
Nashivochnikov N., Pustarnakov V.F. |
26-36 |
CRYPTOGRAPHIC RECURSIVE CONTROL OF INTEGRITY OF METADATA ELECTRONIC DOCUMENTS. PART 4. EVALUATION OF RESULTS
D.I. Tali, O.A. Finko |
37-50 |
ACTIVE MONITORING MODEL AS A BASIS FOR SECURITY MANAGEMENT OF INDUSTRIAL CPS
Poltavtseva M.A. |
51-60 |
ANALYSIS OF VULNERABILITIES OF KEY MANAGEMENT SYSTEMS IN DISTRIBUTED LEDGER USING THE EXAMPLE OF THE IBM BLOCKCHAIN
Plotkin A.S., Kesel S.A., Repin M.M., Fedorov N.V. |
61-70 |
SECURITY AUDIT LOGGING IN MICROSERVICE-BASED SYSTEMS: SURVEY OF ARCHITECTURE PATTERNS
Barabanov A., Makrushin D. |
71-80 |
CYBER RESILIENT PLATFORM FOR INTERNET OF THINGS (IIOT/IOT)ED SYSTEMS: SURVEY OF ARCHITECTURE PATTERNS
Petrenko S.A. |
81-91 |
Leave a Reply