Vol. 56, No. 8, 2022
Methods of Multidimensional Aggregation of Time Series of Streaming Data for Cyber-Physical System Monitoring
p. 829 abstract
Botnet Attack Detection Approach in IoT Networks
p. 838 abstract
Trust Evaluation Problems in Big Data Analytics
p. 847 abstract
Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning
p. 852 abstract
Bank Fraud Detection with Graph Neural Networks
p. 865 abstract
Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems
p. 874 abstract
Performance Evaluation of Antivirus Systems for Computer Networks
p. 883 abstract
Reactive and Proactive Methods for Database Protection against Logical Inference Attacks
p. 888 abstract
Immunization of Complex Networks: Topology and Methods
p. 898 abstract
Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology
p. 906 abstract
Generation of Synthetic Data for Honeypot Systems Using Deep Learning Methods
p. 916 abstract
Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure
p. 927 abstract
Adversarial Machine Learning Protection Using the Example of Evasion Attacks on Medical Images
p. 934 abstract
Immunization of Complex Networks: System of Differential Equations and Dynamic Variation
p. 942 abstract
Authentication and Key Establishment in WSN Based on Key Predistribution
p. 947 abstract
Computer Network Clustering Methods in Cybersecurity Problems
p. 957 abstract
Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks
p. 964 abstract
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
p. 970 abstract
Using Information about Influencing Factors to Split Data Samples in Machine Learning Methods for the Purposes of Assessing Information Security
p. 981 abstract
Two-Component Steganographic System for Embedding Information into Least Significant Bits of Audio Signals
p. 988 abstract
Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices
p. 994 abstract
Noise-Resistant Coding and Highly Undetectable Stegosystems – Is the Alliance Successful?
p. 1007 abstract
Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory
p. 1016 abstract
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains
p. 1025 abstract
Noise-Immune Marking of Digital Audio Signals in Audio Stegosystems with Multiple Inputs and Multiple Outputs
p. 1030 abstract
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure
p. 1040 abstract