№ 3 (61)

Contents of the 3rd issue of the Cybersecurity Issues journal for 2024:

Title Pages
METHODS COMBINING FOR IDENTIFYING OF INSIDERS IN LARGE INFORMATION SYSTEMS
Buinevich M. V., Vlasov D. S., Moiseenko G. Yu.
2–13
COHERENT METRICS ON ATTACK TREES
Volkova E. S., Gisin V. B.
14–22
APPLICATION OF THE LOGICAL-PROBABILISTIC METHOD IN INFORMATION SECURITY. Part 4
Kalashnikov A. O., Anikina E. V., Bugajskij K. A., Birin D. S., Deryabin B. O., Tsependa S. O., Tabakov K. V.
23–32
PREDICTION OF VULNERABILITY CATEGORIES IN CONFIGURATIONS OF DEVICES USING ARTIFICIAL INTELLIGENCE METHODS
Levshun D. S., Vesnin D. V., Kotenko I. V.
33–39
PROBLEMS OF ASSESSING TRUST IN INFORMATION SECURITY AUDIT PROCESSES
Ivanov A. V., Ognev I. A.
40–50
MONETARY INFORMATION SECURITY RISK CRITERIA BASED ON THE ASSET VALUATION APPROACH
Kozyr N. S., Makaryan A. S., Oganesyan L. L.
51–60
RESEARCH ON ADVERSARIAL ATTACKS ON REGRESSION MACHINE LEARNING MODELS IN 5G WIRELESS NETWORKS
Legashev L. V., Zhigalov A. Yu.
61–67
METHODOLOGY FOR THE DEVELOPMENT OF AUTOMATED SOFTWARE CODE GENERATION TOOLS BY FINE-TUNING LARGE LANGUAGE MODELS
Samonov A. V., Burova I. O.
68–75
A METHOD FOR DETECTING FACTS OF CIRCUMVENTION OF INTERNET RESOURCE LOCKS
Ishkuvatov S. M., Begaev A. N., Komarov I. I., Levko I. V.
76–84
A METHOD FOR DETECTING RANSOMWARE BASED ON THE ANALYSIS OF THE BEHAVIORAL REPORT OF THE EXECUTABLE OBJECT
Starodubov M. I., Artemyeva I. L., Selin N. A.
85–89
COUNTERING SOFTWARE VULNERABILITIES. Part 2. ANALYTICAL MODEL AND CONCEPTUAL SOLUTIONS
Leonov N. V.
90–95
ASYMPTOTIC EFFICIENCY OF OPEN NETWORK KEY CONNECTION
Sinyuk A. D., Potapov I. A., Ostroumov O. A.
96–104
ABOUT MODELS TO CONSTRUCT A GRAPH OF INTERACTING OBJECTS IN A NETWORK OF TELEGRAM CHANNELS
Popov V. A., Chepovskiy A. A.
105–112
MODEL OF SYSTEMATIZATION OF CLASSIFIERS OF DESTRUCTIVE AND CONSTRUCTIVE EVENTS IN THE DIGITAL SPACE
Ryzhenko A. A., Seleznev V. M.
113–119
METHODOLOGY FOR IDENTIFYING THE AUTHOR OF TEXT INFORMATION FOR SOLVING CYBERSECURITY TASKS
Romanov A. S.
120–128
METHOD FOR DETECTING SUSPICIOUS TRANSACTIONS OF BANKING CLIENTS BASED ON EMOTION RECOGNITION SYSTEM
Kozminykh S. I., Tatarenkov V. S.
129–140
FEATURES OF THE IMPLEMENTATION OF THE CRYPTANALYSIS SYSTEMS OF HOMOMORPHIC CIPHERS BASED ON THE PROBLEM OF FACTORIZATION OF NUMBERS, USING THE EXAMPLE OF THE CRYPTOSYSTEM MORE
Babenko L. K., Starodubcev V. S.
141–145

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.