Title |
Pages |
METHODS COMBINING FOR IDENTIFYING OF INSIDERS IN LARGE INFORMATION SYSTEMS Buinevich M. V., Vlasov D. S., Moiseenko G. Yu.
|
2–13
|
COHERENT METRICS ON ATTACK TREES Volkova E. S., Gisin V. B.
|
14–22
|
APPLICATION OF THE LOGICAL-PROBABILISTIC METHOD IN INFORMATION SECURITY. Part 4 Kalashnikov A. O., Anikina E. V., Bugajskij K. A., Birin D. S., Deryabin B. O., Tsependa S. O., Tabakov K. V.
|
23–32
|
PREDICTION OF VULNERABILITY CATEGORIES IN CONFIGURATIONS OF DEVICES USING ARTIFICIAL INTELLIGENCE METHODS Levshun D. S., Vesnin D. V., Kotenko I. V.
|
33–39
|
PROBLEMS OF ASSESSING TRUST IN INFORMATION SECURITY AUDIT PROCESSES Ivanov A. V., Ognev I. A.
|
40–50
|
MONETARY INFORMATION SECURITY RISK CRITERIA BASED ON THE ASSET VALUATION APPROACH Kozyr N. S., Makaryan A. S., Oganesyan L. L.
|
51–60
|
RESEARCH ON ADVERSARIAL ATTACKS ON REGRESSION MACHINE LEARNING MODELS IN 5G WIRELESS NETWORKS Legashev L. V., Zhigalov A. Yu.
|
61–67
|
METHODOLOGY FOR THE DEVELOPMENT OF AUTOMATED SOFTWARE CODE GENERATION TOOLS BY FINE-TUNING LARGE LANGUAGE MODELS Samonov A. V., Burova I. O.
|
68–75
|
A METHOD FOR DETECTING FACTS OF CIRCUMVENTION OF INTERNET RESOURCE LOCKS Ishkuvatov S. M., Begaev A. N., Komarov I. I., Levko I. V.
|
76–84
|
A METHOD FOR DETECTING RANSOMWARE BASED ON THE ANALYSIS OF THE BEHAVIORAL REPORT OF THE EXECUTABLE OBJECT Starodubov M. I., Artemyeva I. L., Selin N. A.
|
85–89
|
COUNTERING SOFTWARE VULNERABILITIES. Part 2. ANALYTICAL MODEL AND CONCEPTUAL SOLUTIONS Leonov N. V.
|
90–95
|
ASYMPTOTIC EFFICIENCY OF OPEN NETWORK KEY CONNECTION Sinyuk A. D., Potapov I. A., Ostroumov O. A.
|
96–104
|
ABOUT MODELS TO CONSTRUCT A GRAPH OF INTERACTING OBJECTS IN A NETWORK OF TELEGRAM CHANNELS Popov V. A., Chepovskiy A. A.
|
105–112
|
MODEL OF SYSTEMATIZATION OF CLASSIFIERS OF DESTRUCTIVE AND CONSTRUCTIVE EVENTS IN THE DIGITAL SPACE Ryzhenko A. A., Seleznev V. M.
|
113–119
|
METHODOLOGY FOR IDENTIFYING THE AUTHOR OF TEXT INFORMATION FOR SOLVING CYBERSECURITY TASKS Romanov A. S.
|
120–128
|
METHOD FOR DETECTING SUSPICIOUS TRANSACTIONS OF BANKING CLIENTS BASED ON EMOTION RECOGNITION SYSTEM Kozminykh S. I., Tatarenkov V. S.
|
129–140
|
FEATURES OF THE IMPLEMENTATION OF THE CRYPTANALYSIS SYSTEMS OF HOMOMORPHIC CIPHERS BASED ON THE PROBLEM OF FACTORIZATION OF NUMBERS, USING THE EXAMPLE OF THE CRYPTOSYSTEM MORE Babenko L. K., Starodubcev V. S.
|
141–145
|
Leave a Reply