Articles by keywords "AST"
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 91
- Pages: 57-64
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 0
- 98
- Pages: 96-101
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 0
- 97
- Pages: 79-85
Selection of trust models when integrating distributed information systems of critical application
- Year: 2021
- Issue: 4
- 0
- 93
- Pages: 79-90
Method for searching for clones of program code in binary executable files
- Year: 2024
- Issue: Спецвыпуск
- 0
- 113
- Pages: 46-55
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
- Year: 2024
- Issue: 3
- 0
- 129
- Pages: 94-108
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 3
- 149
- Pages: 30-39
The probabilitic-theoretic models of physical random number generators
- Year: 2024
- Issue: 3
- 4
- 144
- Pages: 9-19
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 4
- 301
- Pages: 58-68
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 16
- 376
- Pages: 147-164