Articles by keywords "Attacks"
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
- Year: 2023
- Issue: 2
- 0
- 149
- Pages: 163-172
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 144
- Pages: 123-139
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 169
- Pages: 148-159
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 280
- Pages: 62-78
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 281
- Pages: 39-49
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 1
- 290
- Pages: 165-175
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 0
- 298
- Pages: 104-116
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 288
- Pages: 95-103
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 411
- Pages: 9-19
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 390
- Pages: 96-109
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 380
- Pages: 104-110
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 2
- 430
- Pages: 156-167
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 18
- 570
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 18
- 564
- Pages: 110-120
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 9
- 533
- Pages: 43-58