Articles by keywords "Attacks"

Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 149
  • Pages: 163-172

A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 144
  • Pages: 123-139

PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 1
  • 169
  • Pages: 148-159

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 191
  • Pages: 118-129

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 0
  • 197
  • Pages: 163-183

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 2
  • 181
  • Pages: 76-88

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 280
  • Pages: 62-78

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 281
  • Pages: 39-49

Using adversarial attacks to protect against automatic text recognition in CAPTCHA services

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 290
  • Pages: 165-175

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 298
  • Pages: 104-116

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 288
  • Pages: 95-103

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 411
  • Pages: 9-19

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • Year: 2022
  • Issue: 1
  • 4
  • 390
  • Pages: 96-109

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 369
  • Pages: 77-84

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 413
  • Pages: 80-95

DDOS ATTACKS DETECTION BASED ON A MODULAR NEURAL NETWORK

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 385
  • Pages: 111-118

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 380
  • Pages: 104-110

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 430
  • Pages: 156-167

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 18
  • 570
  • Pages: 147-164

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 18
  • 564
  • Pages: 110-120

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 9
  • 533
  • Pages: 43-58