Contents of the 2nd issue of the Cybersecurity Issues journal for 2024:
Title |
Pages |
NEW MECHANISMS FOR SELECTING AND IMPLEMENTING INNOVATIVE DEVELOPMENTS CARRIED OUT BY ORGANISATIONS OF THE RUSSIAN FEDERATION ON THEIR OWN INITIATIVE FOR THE BENEFIT OF THE MINISTRY OF DEFENCE OF RUSSIA Osadchuk A. V.
|
2–9
|
DETECTING ATTACKS ON THE INTERNET OF THINGS BASED ON MULTITASKING LEARNING AND HYBRID SAMPLING METHODS Kotenko I. V., Dong H.
|
10–21
|
THE ORGANIZATION OF SEPARATE SECURITY EVENT DATA STORAGE Kuznetsov A. V.
|
22–28
|
DIGITAL TWINS IN CONTROL SYSTEMS Minzov A. S., Nevsky A. Yu., Baronov O. R., Nemchaninova S. V.
|
29–35
|
BUILDING A MODEL OF ADAPTABILITY OF CYBERPHYSICAL SYSTEMS: OPERATION AND DETECTION Fatin A. D.
|
36–43
|
THE EFFECT OF SPEAKER VARIABILITY ON DISTINGUISHABILITY OF BONAFIDE AND SYNTHETIZED SPEECH Evsyukov M. V., Putyato M. M., Makaryan А. S.
|
44–52
|
COMPOSITE PETRI-MARKOV NETWORKS WITH SPECIAL CONSTRUCTION CONDITIONS FOR MODELING INFORMATION SECURITY THREATS Yazov Yu. K., Panfilov A. P.
|
53–65
|
MULTICRITERIA MODEL FOR SYSTEMATIZING METHODS FOR DETECTING AN INSIDER Vlasov D. S.
|
66–73
|
THE METHOD FOR DETECTING SOFTWARE DEFECTS IN JAVASCRIPT ENGINES USING FUZZING Kozachok A. V., Erokhina N. S., Nikolaev D. A.
|
74–80
|
THE GENETIC DE-EVOLUTION CONCEPT OF PROGRAM REPRESENTATIONS. Part 2 Izrailov K. E.
|
81–86
|
COUNTERING SOFTWARE VULNERABILITIES. Part 1. ONTOLOGICAL MODEL Leonov N. V.
|
87–92
|
ALGEBRAIC SIGNATURE ALGORITHMS WITH COMPLETE SIGNATURE RANDOMIZATION Moldovyan A. A., Moldovyan D. N., Kostina A. A.
|
93–100
|
DEVELOPMENT OF OPERATIONS FOR HOMOMORPHIC ENCRYPTION ALGORITHMS Babenko L. K., Rusalovsky I. D.
|
101–106
|
CLASSIFICATION OF COMPUTER ATTACKS USING MULTIFRACTAL SPECTRUM OF FRACTAL DIMENSION Sheluhin O. I., Rybakov S. Y., Rakovskiy D. I.
|
107–119
|
SECURE TRANSMISSION OF MESSAGES WITH DATA SEPARATION VIA MAIL SERVERS Stepanov P. P., Nikonova G. V.
|
120–129
|
Leave a Reply