Content of 4th issue of magazine «Voprosy kiberbezopasnosti» at 2023:
Title |
Pages |
MACHINE LEARNING METHODS FOR CONTROL OF CRYPTOCURRENCY TRANSACTIONS
Feklin V.G., Soloviev V.I., Korchagin S.A., Tsaregorodtsev A.V. |
2-11 |
IDENTIFICATION OF DEVIATIONS IN BEHAVIORAL PATTERNS OF USERS OF CORPORATE INFORMATION RESOURCES USING TOPOLOGICAL FEATURES
Nashivochnikov N.V. |
12-22 |
APPLICATION OF THE LOGICAL-PROBABILISTIC METHOD IN INFORMATION SECURITY (PART 1)
Kalashnikov A.O., Bugajskij K.A., Birin D.S., Deryabin B.O., Tsependa S.O., Tabakov K.V. |
23-32 |
HOMOMORPHIC REALIZATION OF THE GAUSS ELIMINATION METHOD
Babenko L.K., Rusalovsky I.D. |
33-40 |
PROTOCOL FOR MUTUAL AUTHENTICATION OF AN OBJECT’S GROUP WITH DYNAMIC TOPOLOGYBasan A.S., Basan E.S., Ishchukova E.A., Kornilov A.P. |
41-52 |
METHOD OF PERSONAL DATA PROTECTION IN A MEDICAL CLOUD SYSTEM
Shumilin A.S. |
53-64 |
STUDY OF THE EFFECT OF ATTACKS ON STRUCTURAL AND PARAMETRIC METRICS OF NETWORKS WITH ADAPTIVE TOPOLOGY
Pavlenko E.Y. |
65-71 |
|
|
MATHEMATICAL MODEL OF THE VECTOR OF A DDOS ATTACK ON THE ICS USING THE METHOD OF TOPOLOGICAL TRANSFORMATION OF STOCHASTIC NETWORKS
Boger A.M., Sokolov A.N. |
72-79 |
PDIFFERENT GENESIS ATTACKS TO COMPLEX OBJECTS DETECTING METHOD BASED ON CONDITION INFORMATION. PART 2. ALGORITHM, MODEL AND EXPERIMENT
Izrailov K.E., Buinevich M.V. |
80-93 |
DEVELOPMENT OF AN INTEGRATED APPROACH TO ENSURING THE CYBER SECURITY OF INTERCONNECTED INFORMATION SYSTEMS UNDER INTELLIGENT MANAGEMENT OF A MICROGRID COMMUNITY
Gurina L.A., Tomin N.V. |
94-104 |
PROACTIVE SEARCH FOR INTERNAL THREATS TO INFORMATION SECURITY IN CONDITIONS OF CONSTRAINTS
Iskhakov A.Yu., Gaiduk K.A. |
105-119 |
|
|
Leave a Reply