Articles by keywords "Machine Learning"
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 1
- 147
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 132
- Pages: 145-155
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 143
- Pages: 155-166
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 160
- Pages: 25-32
Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things
- Year: 2023
- Issue: 2
- 0
- 145
- Pages: 140-149
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 164
- Pages: 148-159
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 184
- Pages: 135-147
INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE
- Year: 2022
- Issue: 2
- 0
- 168
- Pages: 125-134
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 191
- Pages: 27-33
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 1
- 252
- Pages: 118-126
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 248
- Pages: 74-81
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 293
- Pages: 21-40
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 0
- 299
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 277
- Pages: 39-49
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 1
- 284
- Pages: 165-175
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 0
- 281
- Pages: 109-126
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 0
- 295
- Pages: 178-193
Automatic synthesis of 3D gas turbine blades shapes using machine learning
- Year: 2024
- Issue: 2
- 1
- 301
- Pages: 152-168
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 386
- Pages: 96-109
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 408
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 409
- Pages: 31-43
Protection of the machine learning models from the training data membership inference
- Year: 2024
- Issue: 1
- 1
- 394
- Pages: 142-152
Aspects of detecting malicious installation files using machine learning algorithms
- Year: 2023
- Issue: 2
- 0
- 385
- Pages: 37-46
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 376
- Pages: 104-110
The use of convolutional neural networks to enhance the security of steganographic methods
- Year: 2025
- Issue: Спецвыпуск
- 1
- 455
- Pages: 134-144
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 4
- 446
- Pages: 82-98
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 5
- 460
- Pages: 41-59
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 5
- 476
- Pages: 83-96
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 18
- 567
- Pages: 147-164
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 8
- 506
- Pages: 59-68