Vol. 55, No. 8, 2021
Information Security Incident Forecasting
p. 903 abstract
Application of Neuro-Fuzzy Inference to Detect Network Scanning
p. 908 abstract
Comparison of Four Methods of Checking the Integrity of Transmitted Message Blocks
p. 918 abstract
Architecture and Operation Algorithm of a Biometric Voice Authentication System
p. 924 abstract
Automated Search for Vulnerabilities in ARM Software Using Dynamic Symbolic Execution
p. 932 abstract
Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences
p. 941 abstract
Constructing the Model of an Information System for the Automatization of Penetration Testing
p. 949 abstract
Requirements on Providing a Sustainability of Industrial Internet of Things
p. 956 abstract
The Use of Beacon Signals to Detect Covert Channels in DNS Traffic
p. 962 abstract
Methodology of Mediametric Information Analysis with the Use of Machine Learning Algorithms
p. 970 abstract
Localization of the Root Cause of the Anomaly
p. 978 abstract
Comparative Analysis of Methods for Protection against Logical Inference
p. 984 abstract
Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices
p. 991 abstract
Organization of Environmental Monitoring of the Port Water Area by Processing an Anti-Interference Signal from a Vessel Traffic Control System
p. 999 abstract
A Method for Watermark Detection in Digital Audio Signals by Authorized Users
p. 1005 abstract
Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity
p. 1020 abstract
Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms
p. 1025 abstract
New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication
p. 1029 abstract
Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm
p. 1039 abstract
Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks
p. 1051 abstract
Using Security-through-Obscurity Principle in an Industrial Internet of Things
p. 1061 abstract
Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks
p. 1068 abstract
Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
p. 1080 abstract
Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing
p. 1087 abstract
Detection of Malicious Executable Files Based on Clustering of Activities
p. 1092 abstract
Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident
p. 1099 abstract
Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks
p. 1104 abstract
Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems
p. 1111 abstract
Use of Contradictions in Data for Finding Implicit Failures in Computer Systems
p. 1115 abstract
An Encrypted File Detection Algorithm
p. 1121 abstract
Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems
p. 1129 abstract
Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices
p. 1136 abstract
Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic
p. 1142 abstract
Theoretical Approach for Evaluating the Connectivity of Distributed Systems and Telecommunications for the Digital Economy
p. 1149 abstract
A Two-Component Steganographic System Based on the Sum of Linear Functions of Two Signals Using a Multiplicative Form of Constraint of Embedded Signals
p. 1153 abstract
Basic Principles of Creating Control Algorithms for a Remotely Piloted Sea Vessel to Improve the Information Security of Noisy Data Transmission Channels
p. 1159 abstract
Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning
p. 1165 abstract
Software Identification by Standard Machine Learning Tools
p. 1175 abstract
On Cryptographic Properties of the NB-Fi Protocol
p. 1180 abstract
An Integrity Control Model for Multidimensional Data Arrays
p. 1188 abstract
Implementation of Honeypot Systems Based on the Potential Attack Graph
p. 1194 abstract
Formation of Data Structures in the Problems of Active Security Monitoring
p. 1201 abstract
Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis
p. 1209 abstract
Fake Post Detection Using Graph Neural Networks
p. 1215 abstract
Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization
p. 1222 abstract