Publication schedule
-
№1 March 2026
Articles by keywords "Method"
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
- Year: 2023
- Issue: 3
- 1
- 351
- Pages: 82-89
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 370
- Pages: 61-72
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 373
- Pages: 135-147
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 399
- Pages: 108-117
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 418
- Pages: 9-15
Development of a data hashing method based on cellular automation and its advantages
- Year: 2021
- Issue: 4
- 0
- 505
- Pages: 51-60
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 479
- Pages: 157-164
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 509
- Pages: 9-21
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 520
- Pages: 58-68
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 1
- 504
- Pages: 178-193
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 595
- Pages: 96-109
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 610
- Pages: 57-65
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 1
- 568
- Pages: 58-67
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 582
- Pages: 104-110
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 607
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 7
- 734
- Pages: 41-59
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 24
- 799
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 23
- 824
- Pages: 110-120
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
- Year: 2025
- Issue: 3
- 3
- 708
- Pages: 100-109
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 787
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 5
- 734
- Pages: 21-29