Articles by keywords "Attacks"
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 6
- 272
- Pages: 58-68
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
- Year: 2023
- Issue: 2
- 0
- 534
- Pages: 163-172
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 543
- Pages: 123-139
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 538
- Pages: 148-159
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 2
- 748
- Pages: 62-78
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 698
- Pages: 39-49
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 2
- 703
- Pages: 165-175
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 1
- 697
- Pages: 104-116
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 666
- Pages: 95-103
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 830
- Pages: 9-19
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 772
- Pages: 96-109
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 757
- Pages: 104-110
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 7
- 833
- Pages: 156-167
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 26
- 1015
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 25
- 1029
- Pages: 110-120
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 984
- Pages: 43-58