Publication schedule
-
№4 December 2023
Articles by keywords "security"
Ensuring confidence in control systems of technological equipment
- Year: 2021
- Volume: 14
- Issue: 4
- 24
- 2057
- Pages: 71-83
Techniques for hybridization of intelligent methods for detecting malicious traffic
- Year: 2020
- Volume: 13
- Issue: 3
- 21
- 3196
- Pages: 31-43
Information security objects modelling for risk assessment
- Year: 2009
- Issue: 5
- 0
- 4533
- Pages: 151-155
Security facilities construction and optimization based on risk analysis
- Year: 2011
- Issue: 6
- 1
- 4652
- Pages: 207-211
Technology Information Security of Large Museum and Exhibition Complexes
- Year: 2015
- Issue: 6
- 179
- 5062
- Pages: 14-24
Multi-level model with differential trust level to subjects for the distributed databases data security improving
- Year: 2012
- Issue: 6
- 1
- 4696
- Pages: 54-58
Digital watermarks system for audio signals based on the reverberation effect
- Year: 2012
- Issue: 6
- 0
- 4479
- Pages: 43-49
Ontological model for security of information-measuring technologies based on the common criteria
- Year: 2010
- Issue: 5
- 1
- 4649
- Pages: 186-191
Software-based complex for information security risk assessment based on frame-production knowledge representation
- Year: 2010
- Issue: 5
- 0
- 4649
- Pages: 98-102
Securing confidentiality of transmitted information at the network layer
- Year: 2009
- Issue: 4
- 0
- 4669
- Pages: 60-65
Technology for protection of personal data using ORACLE DBMS
- Year: 2012
- Issue: 4
- 0
- 4528
- Pages: 36-40
Heuristic network intrusion detection system prototype based on principal component analysis
- Year: 2010
- Issue: 4
- 0
- 4575
- Pages: 200-204
New generation of security information and event management systems
- Year: 2014
- Issue: 3
- 616
- 5551
- Pages: 7-18
An encryption algorithm using chaotic tent map security evaluation
- Year: 2012
- Issue: 3
- 0
- 4479
- Pages: 23-27
Scientific-educational cluster as a modern form of professional education
- Year: 2012
- Issue: 2
- 0
- 4525
- Pages: 161-168
Access control with the help of Gödel’s encoding of virtual connections content
- Year: 2012
- Issue: 2
- 0
- 4765
- Pages: 104-109
Network centric access control model and methods in cloud computing systems
- Year: 2012
- Issue: 2
- 0
- 4707
- Pages: 91-95
Protection of information resources branch monitoring system and fishery database cryptographic technique
- Year: 2012
- Issue: 2
- 0
- 4391
- Pages: 7-13
Data mining in a database of the antivirus protection management server
- Year: 2013
- Issue: 1
- 848
- 5961
- Pages: 44-49