Articles by keywords "Algorithm"

Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 132
  • Pages: 133-144

Substantiation of the rational composition of the information security system

Information security aspects
  • Year: 2023
  • Issue: 4
  • 0
  • 142
  • Pages: 9-18

Balance production models with information security

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2023
  • Issue: 3
  • 0
  • 142
  • Pages: 138-147

VOICE IDENTIFICATION METHOD BASED ON MACHINE LEARNING

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 144
  • Pages: 143-154

SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 143
  • Pages: 130-142

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 2
  • 0
  • 153
  • Pages: 202-211

THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 158
  • Pages: 106-124

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 191
  • Pages: 27-33

Model for forming development program of organization’s information security system

Special IT
  • Year: 2021
  • Issue: 2
  • 5
  • 304
  • Pages: 109-117

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 279
  • Pages: 41-47

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 282
  • Pages: 86-95

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 276
  • Pages: 62-78

Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 269
  • Pages: 20-30

A concept of the protected distributed ledger technology for smart city digital environment

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 285
  • Pages: 10-16

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 385
  • Pages: 37-46

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 427
  • Pages: 156-167

An automated method for assessing the correctness of distributed algorithms using chaos engineering testing

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 433
  • Pages: 99-111

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 470
  • Pages: 112-120

On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 13
  • 514
  • Pages: 180-191

Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 3
  • 492
  • Pages: 100-109

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 5
  • 514
  • Pages: 69-80