Assessment of the Effectiveness of an Information Security System D. P. ZegzhdaT. N. SaurenkoE. G. Anisimov OriginalPaper 29 February 2024 Pages: 855 - 861
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction M. V. ShakurskiiO. A. KaraulovaE. S. Kartashevskaya OriginalPaper 29 February 2024 Pages: 862 - 867
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering A. D. DakhnovichD. S. ZagalskyR. S. Solovey OriginalPaper 29 February 2024 Pages: 868 - 874
Current Trends in Methods of the Efficient Automation of Data Processing I. A. SikarevT. V. VekshinaE. M. Korinets OriginalPaper 29 February 2024 Pages: 875 - 880
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems D. P. ZegzhdaA. F. SuprunE. G. Anisimov OriginalPaper 29 February 2024 Pages: 881 - 885
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography N. N. Shenets OriginalPaper 29 February 2024 Pages: 886 - 893
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures D. A. Moskvin OriginalPaper 29 February 2024 Pages: 894 - 903
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols S. O. KostinE. B. Aleksandrova OriginalPaper 29 February 2024 Pages: 904 - 913
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet P. V. SemyanovS. V. Grezina OriginalPaper 29 February 2024 Pages: 914 - 921
Finding Enumerators for Generalized (L, G)-Code I. K. NoskovS. V. Bezzateev OriginalPaper 29 February 2024 Pages: 922 - 927
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials D. V. KushnirS. N. Shemyakin OriginalPaper 29 February 2024 Pages: 928 - 932
Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values R. A. OgnevD. P. Zegzhda OriginalPaper 29 February 2024 Pages: 933 - 937
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches M. A. EremeevI. I. Zakharchuk OriginalPaper 29 February 2024 Pages: 938 - 946
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code G. S. KubrinD. P. Zegzhda OriginalPaper 29 February 2024 Pages: 947 - 957
Analysis of Decompiled Program Code Using Abstract Syntax Trees N. A. GribkovT. D. OvasapyanD. A. Moskvin OriginalPaper 29 February 2024 Pages: 958 - 967
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms P. E. YugaiE. V. ZhukovskiiP. O. Semenov OriginalPaper 29 February 2024 Pages: 968 - 974
Confidentiality of Machine Learning Models M. A. PoltavtsevaE. A. Rudnitskaya OriginalPaper 29 February 2024 Pages: 975 - 982
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems M. O. KalininA. F. SuprunO. D. Ivanova OriginalPaper 29 February 2024 Pages: 983 - 988
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder V. V. PlatonovN. M. Grigorjeva OriginalPaper 29 February 2024 Pages: 989 - 995
Protection of Computational Machine Learning Models against Extraction Threat M. O. KalininM. D. SoshnevA. S. Konoplev OriginalPaper 29 February 2024 Pages: 996 - 1004
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods S. V. BezzateevS. G. FomichevaA. F. Suprun OriginalPaper 29 February 2024 Pages: 1005 - 1017
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic G. A. Markov OriginalPaper 29 February 2024 Pages: 1018 - 1024
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction M. O. KalininE. I. Tkacheva OriginalPaper 29 February 2024 Pages: 1025 - 1032
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure E. M. OrelD. A. MoskvinI. A. Anoshkin OriginalPaper 29 February 2024 Pages: 1033 - 1039
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory V. M. KrundyshevG. A. MarkovA. G. Busygin OriginalPaper 29 February 2024 Pages: 1040 - 1046
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks D. S. LavrovaO. A. Izotova OriginalPaper 29 February 2024 Pages: 1047 - 1054
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology E. Yu. PavlenkoM. A. Pakhomov OriginalPaper 29 February 2024 Pages: 1055 - 1062
Framework for Modeling Security Policies of Big Data Processing Systems M. A. PoltavtsevaD. V. IvanovE. V. Zavadskii OriginalPaper 29 February 2024 Pages: 1063 - 1070
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation M. E. SukhoparovI. S. Lebedev OriginalPaper 29 February 2024 Pages: 1071 - 1075
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks E. B. AleksandrovaA. A. Shtyrkina OriginalPaper 29 February 2024 Pages: 1076 - 1083
Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs E. Yu. Pavlenko OriginalPaper 29 February 2024 Pages: 1084 - 1095
Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components M. A. Poltavtseva OriginalPaper 29 February 2024 Pages: 1096 - 1102
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity D. S. LavrovaV. M. BoginaE. Yu. Pavlenko OriginalPaper 29 February 2024 Pages: 1103 - 1115
A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity A. D. ShilovaA. A. Vorob’eva OriginalPaper 29 February 2024 Pages: 1116 - 1125
Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins A. I. AlmuhamedovV. S. Kolomoitcev OriginalPaper 29 February 2024 Pages: 1126 - 1134