Contents of the 6th issue of the Cybersecurity Issues journal for 2024:
Title |
Pages |
METHODOLOGICAL PROVISIONS ON PROBABILISTIC PREDICTION OF INFORMATION SYSTEMS OPERATION QUALITY. Part 2. MODELING USING “BLACK BOXES” Kostogryzov A. I., Nistratov A. A., Golosov P. E.
|
2–27
|
PREVENTION OF COMPUTER ATTACKS SUCH AS MAN IN THE MIDDLE, COMMITTED USING GENERATIVE ARTIFICIAL INTELLIGENCE Zharova A. K., Elin V. M., Avetisyan B. R.
|
28–41
|
PROTESTWARE: ANALYSIS AND DEFENCE APPROACH BASED ON MACHINE LEARNING Kotenko I. V., Saenko I. B., Lauta O. S., Yuryev A. S., Zaprudnov M. S.
|
42–52
|
INTELLIGENT METHODS OF ENSURING CYBERSECURITY MULTI-AGENT CONTROL SYSTEM OF MICROGRID Gurina L. A., Tomin N. V.
|
53–64
|
DETECTING OBFUSCATED EXPLOITS IN NON-EXECUTABLE FORMAT FILES Arkhipov A. N., Kondakov S. Е.
|
65–75
|
PATTERN FOR SECURING WEB APPLICATIONS AGAINST XSS ATTACKS IN CLOUD INFRASTRUCTURE Korneev N. V., Lazorin D. S.
|
76–84
|
PROBLEMATIC ISSUES OF INFORMATION PROTECTION MANAGEMENT AGAINST LEAKAGE THROUGH TECHNICAL CHANNELS USING MULTI-AGENT SYSTEMS Yazov Yu. K., Avsentiev A. O.
|
85–97
|
ALGEBRAIC SIGNATURE ALGORITHMS WITH TWO HIDDEN GROUPS Moldovyan N. A., Petrenko A. S.
|
98–107
|
THE INSTRUCTIONS “RESISTANT” INCREASING AS A WAY TO COUNTER UNINTENTIONAL INSIDING Buinevich M. V., Moiseenko G. Yu.
|
108–116
|
DISTRIBUTED NETWORK ATTACK DETECTION SYSTEM BASED ON FEDERATE TRANSFER LEARNING Vasilyev V. I., Vulfin A. M., Kartak V. M., Bashmakov N. M., Kirillova A. D.
|
117–129
|
MASKING OF TOPOLOGICAL PROPERTIES OF COMPUTER NETWORKS IN NETWORK RECONNAISSANCE CONDITIONS. Part 1 Gorbachev A. A.
|
130–139
|
MODEL OF THE ADAPTIVE CONTROL SYSTEM OF THE CYBER RANGE OF THE RUSSIAN EMERGENCIES MINISTRY BASED ON THE OPERATOR EQUATION Gryzunov V. V., Shestakov A. V.
|
140–149
|
Leave a Reply