№ 2 (66)

Contents of the 2d issue of the Cybersecurity Issues journal for 2025:

Title Pages
METHODOLOGICAL PROVISIONS ON PROBABILISTIC PREDICTION OF INFORMATION SYSTEMS OPERATION QUALITY. Part 3. MODELING OF COMPLEX SYSTEMS. INTEGRAL ANALYSIS
Kostogryzov A. I., Nistratov A. A., Golosov P. E.
2–19
SELECTING TIME SERIES NESTING PARAMETERS TO DETECT DATA ANOMALIES IN BEHAVIORAL ANALYTICS SYSTEMS
Nashivochnikov N. V., Mezheneva I. O., Chatoyan S. K.
20–28
PATTERN FOR SECURING INFORMATION INFRASTRUCTURE DURING VIRTUAL MACHINE IMAGE MIGRATION
Korneev N. V., Dikiy A. B.
29–40
SELECTING TIME SERIES NESTING PARAMETERS TO DETECT DATA ANOMALIES IN BEHAVIORAL ANALYTICS SYSTEMS
Gavrilov A. V., Krayushkin D. V., Kulikov I. V., Solominov M. V., Chepovsky A. M.
41–51
METHOD FOR CONSTRUCTING POST-QUANTUM ALGORITHMS OF EDS WITH TWO HIDDEN GROUPS
Petrenko A. S.
52–63
FREQUENCY CRYPTANALYSIS OF AN ASYMMETRIC CRYPTOGRAPHIC SYSTEM BASED ON ARTIFICIAL NEURAL NETWORKS AND NOISE-RESISTANT INFORMATION CODING
Kozachok A. V., Tarasenko S. S., Kozachok A. V.
64–70
COMPREHENSIVE ANALYSIS OF WINDOWS SYSTEM BEHAVIOR FOR CYBER THREAT DETECTION
Dolgachev M. V., Kostyunin V. A.
71–77
DevSecOps: UNIFYING DEVELOPMENT AND SECURITY PROCESSES
Blinov A. V., Bezzateev S. V.
78–89
METHODOLOGY FOR ASSESSING THE DEGREE OF INFLUENCE OF NAVIGATION ATTACKS ON CYBER-PHYSICAL SYSTEMS
Basan E. S., Lesnikov A. A., Mikhailova V. D., Mogilny A. B., Firsova M. G.
90–104
METHODOLOGY OF GENERATING SYNTHETIC DATA FOR INTELLIGENT ANALYSIS SYSTEMS IN THE PROBLEM OF MALWARE DETECTION
Starodubov M. I., Borshevnikov A. E., Selin N. A.
105–113
A METHOD OF COUNTERING ADVERSARIAL ATTACKS ON IMAGE CLASSIFICATION SYSTEMS
Kotenko I. V., Saenko I. B., Lauta O. S., Vasiliev N. A., Sadovnikov V. E.
114–123
VULNERABILITY ASSESSMENT OF AUTOMATED SYSTEMS USING PROBABILITY THEORY, STUDENT’S DISTRIBUTION, AND NORMAL RANDOM VARIABLES
Atlasov I. V., Efimov A. O., Rogozin E. A., Cherkasova A. S.
124–131
A METHOD FOR DETECTING TARGETED ATTACKS IN EARLY PHASES
Lapsar A. P., Kenesarieva D. G.
132–140
DETECTION OF PHISHING INTERNET DOMAINS USING MACHINE LEARNING ALGORITHMS IN REAL-TIMEDATA STREAMING
Pavlychev A. V., Kuzminetc K. V.
141–153

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.