Publication schedule
-
№1 March 2026
Articles by keywords "Attacks"
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 0
- 18
- Pages: 58-68
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
- Year: 2023
- Issue: 2
- 0
- 349
- Pages: 163-172
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 354
- Pages: 123-139
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 367
- Pages: 148-159
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 508
- Pages: 62-78
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 496
- Pages: 39-49
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 1
- 510
- Pages: 165-175
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 1
- 514
- Pages: 104-116
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 486
- Pages: 95-103
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 624
- Pages: 9-19
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 595
- Pages: 96-109
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 582
- Pages: 104-110
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 6
- 647
- Pages: 156-167
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 24
- 799
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 23
- 824
- Pages: 110-120
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 787
- Pages: 43-58