№ 2 (54)

Content of 2nd issue of magazine «Voprosy kiberbezopasnosti» at 2023:

Title Pages
THEMATIC MODELING AND SUMMARIZATION OF TEXTS IN THE FIELD OF CYBER SECURITY (BASED ON JOURNAL PUBLICATIONS)
Vasilyev V.I., Vulfin A.M., Kuchkarova N.V.
2-22
CONSTRUCTION OF COMPOSITE CRITERIA FOR OPTIMIZATION OF TERMS AND GENERALIZED INDICATOR OF KNOWLEDGE BASES OF INTELLIGENT SYSTEMS
Sidnyaev N.I., Sineva E.E.
23-35
A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION
Dichenko S.A., Samoylenko D.V., Finko O.A., Ryumshin K.Yu.
36-51
A NEW APPROACH TO THE DEVELOPMENT OF MULTIDIMENSIONAL CRYPTOGRAPHY ALGORITHMS
MoldovyanA.A., Moldovyan D.N., and Moldovyan N.A.
52-64
ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYSAveryanov V.S., Kartsan I.N. 65-72
MANAGEMENT OF ACCESS TO ELECTRONIC INFORMATION AND EDUCATIONAL ENVIRONMENT OF UNIVERSITIES OF FEDERAL EXECUTIVE AUTHORITIES
Kotenko I.V., Saenko I.B., Zakharchenko R.I,, Kapustin A.S., Mazen Al-Barri.
73-84
DEVELOPMENT OF A METHODOLOGY FOR MONITORING THE LEVEL OF INFORMATION SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE OBJECTS
Baksheev A.S., Livshitz I.I.
85-98
THE TECHNIQUE OF BUILDING A SUSTAINABLE PROTECTION SYSTEM BASED ON ADVERSARIAL MACHINE LEARNING IN 6G WIRELESS NETWORKS

Legashev L.V., Grishina L.S.

99-108
PROTECTION GENERALIZED MODEL AGAINST CYBER ATTACKS ON VOIP

Izrailov K.E., Makarova A.K., Shestakov A.V.

109-121

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.