Vol. 58, No. 8, 2024
Justification of the Rational Composition of the Information Security System
p. 1093 abstract
Construction of Deterministic and Stochastic Mathematical Models of Information System Protection
p. 1100 abstract
Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes
p. 1108 abstract
The Concept of Secure Distributed Ledger Technology in the Digital Environment of a Smart City
p. 1114 abstract
Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation
p. 1119 abstract
Mathematical Model of Information Security Event Management Using a Markov Chain in Industrial Systems
p. 1132 abstract
Threat Model for Decentralized Messaging Systems
p. 1139 abstract
Detecting Malware Using Deep Neural Networks
p. 1147 abstract
Cluster Analysis of a Collective of Algorithms of Multicore Neural Network Automata and Robots on Chip
p. 1156 abstract
Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling
p. 1164 abstract
Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources
p. 1169 abstract
Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis
p. 1180 abstract
Segmenting Input Data to Improve the Quality of Identification of Information Security Events
p. 1192 abstract
Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems
p. 1204 abstract
Detecting Synthesized Audio Files Using Graph Neural Networks
p. 1212 abstract
Detecting Attacks Using Artificial Neural Networks
p. 1218 abstract
Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems
p. 1226 abstract
Protecting Machine Learning Models from Training Data Set Extraction
p. 1234 abstract
Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects
p. 1242 abstract
Formal Statement of the Problem of Morphing Executive Code in Software Operation
p. 1250 abstract
Detecting Defects in Multicomponent Software Using a Set of Universal Graph Representations of the Code
p. 1255 abstract
Method of Searching for Clones of the Program Code in Binary Executive Files
p. 1263 abstract
Identification and Verification of Authorship Using Machine and Deep Learning Methods
p. 1271 abstract
The Use of Generative-Adversarial Networks to Counter Steganalysis
p. 1283 abstract
Model of a Distributed Storage System for Crypto Wallet Private Keys
p. 1289 abstract
On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves
p. 1297 abstract
Probability-Theoretical Models of Physical Random Number Generators
p. 1303 abstract
Verification of Access Control in Big Data Systems Using Temporal Logics
p. 1311 abstract
Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes
p. 1318 abstract
Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept
p. 1326 abstract
Application of Distributed Ledger Technology to Ensure the Security of Smart City Information Systems
p. 1336 abstract
Protection of Ad Hoc Networks against Distributed Network Scanning
p. 1343 abstract
Assessing the Security of Big Data Systems
p. 1352 abstract
Analysis of Data Exchange Systems about Information Security Threats
p. 1365 abstract
Researching the Performance of AutoML Platforms in Confidential Computing
p. 1373 abstract
Intelligent Recommendation System for Countering Network Attacks
p. 1386 abstract
Method of Embedding Hidden Data into a Message Stream with Noise-Immune Encoding
p. 1392 abstract
Development of Software and Hardware to Protect Technological Processes from Cyber Threats
p. 1396 abstract
Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics
p. 1406 abstract
Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology
p. 1422 abstract
Assessment of the Competence of an Intelligent Information Security Management System
p. 1429 abstract
Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems
p. 1436 abstract
Graph of Self-Regulation of Various Types of Networks with Adaptive Topology
p. 1442 abstract