Articles by keywords "AST"

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 91
  • Pages: 57-64

Security through obscurity in industrial Internet of Things

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 91
  • Pages: 131-137

Efficiency of computer network functioning in conditions of malicious information influences

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 98
  • Pages: 96-101

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 97
  • Pages: 79-85

Selection of trust models when integrating distributed information systems of critical application

Critical information infrastructure security
  • Year: 2021
  • Issue: 4
  • 0
  • 93
  • Pages: 79-90

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 113
  • Pages: 46-55

Analysis and prediction of states of industrial networks with adaptive topology based on network motifs

Cyber-physic systems security
  • Year: 2024
  • Issue: 3
  • 0
  • 129
  • Pages: 94-108

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 3
  • 149
  • Pages: 30-39

The probabilitic-theoretic models of physical random number generators

Information security aspects
  • Year: 2024
  • Issue: 3
  • 4
  • 144
  • Pages: 9-19

Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 2
  • 1
  • 129
  • Pages: 73-83

Application of large language models in event forecasting field

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 301
  • Pages: 58-68

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 16
  • 376
  • Pages: 147-164