№ 6 (64)

Contents of the 6th issue of the Cybersecurity Issues journal for 2024:

Title Pages
METHODOLOGICAL PROVISIONS ON PROBABILISTIC PREDICTION OF INFORMATION SYSTEMS OPERATION QUALITY. Part 2. MODELING USING “BLACK BOXES”
Kostogryzov A. I., Nistratov A. A., Golosov P. E.
2–27
PREVENTION OF COMPUTER ATTACKS SUCH AS MAN IN THE MIDDLE, COMMITTED USING GENERATIVE ARTIFICIAL INTELLIGENCE
Zharova A. K., Elin V. M., Avetisyan B. R.
28–41
PROTESTWARE: ANALYSIS AND DEFENCE APPROACH BASED ON MACHINE LEARNING
Kotenko I. V., Saenko I. B., Lauta O. S., Yuryev A. S., Zaprudnov M. S.
42–52
INTELLIGENT METHODS OF ENSURING CYBERSECURITY MULTI-AGENT CONTROL SYSTEM OF MICROGRID
Gurina L. A., Tomin N. V.
53–64
DETECTING OBFUSCATED EXPLOITS IN NON-EXECUTABLE FORMAT FILES
Arkhipov A. N., Kondakov S. Е.
65–75
PATTERN FOR SECURING WEB APPLICATIONS AGAINST XSS ATTACKS IN CLOUD INFRASTRUCTURE
Korneev N. V., Lazorin D. S.
76–84
PROBLEMATIC ISSUES OF INFORMATION PROTECTION MANAGEMENT AGAINST LEAKAGE THROUGH TECHNICAL CHANNELS USING MULTI-AGENT SYSTEMS
Yazov Yu. K., Avsentiev A. O.
85–97
ALGEBRAIC SIGNATURE ALGORITHMS WITH TWO HIDDEN GROUPS
Moldovyan N. A., Petrenko A. S.
98–107
THE INSTRUCTIONS “RESISTANT” INCREASING AS A WAY TO COUNTER UNINTENTIONAL INSIDING
Buinevich M. V., Moiseenko G. Yu.
108–116
DISTRIBUTED NETWORK ATTACK DETECTION SYSTEM BASED ON FEDERATE TRANSFER LEARNING
Vasilyev V. I., Vulfin A. M., Kartak V. M., Bashmakov N. M., Kirillova A. D.
117–129
MASKING OF TOPOLOGICAL PROPERTIES OF COMPUTER NETWORKS IN NETWORK RECONNAISSANCE CONDITIONS. Part 1
Gorbachev A. A.
130–139
MODEL OF THE ADAPTIVE CONTROL SYSTEM OF THE CYBER RANGE OF THE RUSSIAN EMERGENCIES MINISTRY BASED ON THE OPERATOR EQUATION
Gryzunov V. V., Shestakov A. V.
140–149

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.