Vol. 57, No. 8, 2023
Assessment of the Effectiveness of an Information Security System
p. 855 abstract
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction
p. 862 abstract
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering
p. 868 abstract
Current Trends in Methods of the Efficient Automation of Data Processing
p. 875 abstract
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems
p. 881 abstract
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
p. 886 abstract
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
p. 894 abstract
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols
p. 904 abstract
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
p. 914 abstract
Finding Enumerators for Generalized (L, G)-Code
p. 922 abstract
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials
p. 928 abstract
Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values
p. 933 abstract
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches
p. 938 abstract
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code
p. 947 abstract
Analysis of Decompiled Program Code Using Abstract Syntax Trees
p. 958 abstract
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
p. 968 abstract
Confidentiality of Machine Learning Models
p. 975 abstract
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems
p. 983 abstract
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder
p. 989 abstract
Protection of Computational Machine Learning Models against Extraction Threat
p. 996 abstract
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
p. 1005 abstract
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic
p. 1018 abstract
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction
p. 1025 abstract
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure
p. 1033 abstract
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
p. 1040 abstract
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks
p. 1047 abstract
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology
p. 1055 abstract
Framework for Modeling Security Policies of Big Data Processing Systems
p. 1063 abstract
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation
p. 1071 abstract
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks
p. 1076 abstract
Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs
p. 1084 abstract
Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components
p. 1096 abstract
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity
p. 1103 abstract
A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity
p. 1116 abstract
Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins
p. 1126 abstract