Publication schedule
-
№1 March 2026
Articles by keywords "Machine Learning"
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 3
- 415
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 345
- Pages: 145-155
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 336
- Pages: 155-166
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 368
- Pages: 25-32
Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things
- Year: 2023
- Issue: 2
- 0
- 354
- Pages: 140-149
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 367
- Pages: 148-159
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 373
- Pages: 135-147
INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE
- Year: 2022
- Issue: 2
- 0
- 377
- Pages: 125-134
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 454
- Pages: 27-33
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 3
- 469
- Pages: 118-126
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 462
- Pages: 74-81
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 535
- Pages: 21-40
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 1
- 552
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 496
- Pages: 39-49
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 1
- 510
- Pages: 165-175
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 494
- Pages: 109-126
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 1
- 504
- Pages: 178-193
Automatic synthesis of 3D gas turbine blades shapes using machine learning
- Year: 2024
- Issue: 2
- 3
- 528
- Pages: 152-168
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 595
- Pages: 96-109
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 610
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 614
- Pages: 31-43
Protection of the machine learning models from the training data membership inference
- Year: 2024
- Issue: 1
- 2
- 590
- Pages: 142-152
Aspects of detecting malicious installation files using machine learning algorithms
- Year: 2023
- Issue: 2
- 0
- 581
- Pages: 37-46
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 582
- Pages: 104-110
The use of convolutional neural networks to enhance the security of steganographic methods
- Year: 2025
- Issue: Спецвыпуск
- 2
- 691
- Pages: 134-144
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 13
- 697
- Pages: 82-98
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 7
- 734
- Pages: 41-59
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 7
- 715
- Pages: 83-96
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 24
- 799
- Pages: 147-164
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 10
- 733
- Pages: 59-68