Publication schedule
-
№4 December 2024
-
№1 March 2025
-
№2 June 2025
-
№3 September 2025
Articles by keywords "security"
Ensuring confidence in control systems of technological equipment
- Year: 2021
- Volume: 14
- Issue: 4
- 24
- 3715
- Pages: 71-83
Techniques for hybridization of intelligent methods for detecting malicious traffic
- Year: 2020
- Volume: 13
- Issue: 3
- 22
- 4651
- Pages: 31-43
Information security objects modelling for risk assessment
- Year: 2009
- Issue: 5
- 0
- 5921
- Pages: 151-155
Security facilities construction and optimization based on risk analysis
- Year: 2011
- Issue: 6
- 1
- 6070
- Pages: 207-211
Technology Information Security of Large Museum and Exhibition Complexes
- Year: 2015
- Issue: 6
- 180
- 6526
- Pages: 14-24
Multi-level model with differential trust level to subjects for the distributed databases data security improving
- Year: 2012
- Issue: 6
- 1
- 6037
- Pages: 54-58
Digital watermarks system for audio signals based on the reverberation effect
- Year: 2012
- Issue: 6
- 0
- 5802
- Pages: 43-49
Ontological model for security of information-measuring technologies based on the common criteria
- Year: 2010
- Issue: 5
- 1
- 6008
- Pages: 186-191
Software-based complex for information security risk assessment based on frame-production knowledge representation
- Year: 2010
- Issue: 5
- 0
- 6063
- Pages: 98-102
Securing confidentiality of transmitted information at the network layer
- Year: 2009
- Issue: 4
- 0
- 6093
- Pages: 60-65
Technology for protection of personal data using ORACLE DBMS
- Year: 2012
- Issue: 4
- 0
- 5823
- Pages: 36-40
Heuristic network intrusion detection system prototype based on principal component analysis
- Year: 2010
- Issue: 4
- 0
- 5962
- Pages: 200-204
New generation of security information and event management systems
- Year: 2014
- Issue: 3
- 620
- 6984
- Pages: 7-18
An encryption algorithm using chaotic tent map security evaluation
- Year: 2012
- Issue: 3
- 0
- 5824
- Pages: 23-27
Scientific-educational cluster as a modern form of professional education
- Year: 2012
- Issue: 2
- 0
- 5801
- Pages: 161-168
Access control with the help of Gödel’s encoding of virtual connections content
- Year: 2012
- Issue: 2
- 0
- 6186
- Pages: 104-109
Network centric access control model and methods in cloud computing systems
- Year: 2012
- Issue: 2
- 0
- 6062
- Pages: 91-95
Protection of information resources branch monitoring system and fishery database cryptographic technique
- Year: 2012
- Issue: 2
- 0
- 5763
- Pages: 7-13
Data mining in a database of the antivirus protection management server
- Year: 2013
- Issue: 1
- 849
- 7264
- Pages: 44-49