Articles by keywords "Method"
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
- Year: 2023
- Issue: 3
- 0
- 144
- Pages: 82-89
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 147
- Pages: 61-72
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 184
- Pages: 135-147
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 176
- Pages: 108-117
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 1
- 182
- Pages: 9-15
Development of a data hashing method based on cellular automation and its advantages
- Year: 2021
- Issue: 4
- 0
- 275
- Pages: 51-60
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 271
- Pages: 157-164
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 296
- Pages: 9-21
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 2
- 314
- Pages: 58-68
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 0
- 295
- Pages: 178-193
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 386
- Pages: 96-109
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 408
- Pages: 57-65
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 0
- 383
- Pages: 58-67
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 376
- Pages: 104-110
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 404
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 5
- 460
- Pages: 41-59
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 18
- 567
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 18
- 561
- Pages: 110-120
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
- Year: 2025
- Issue: 3
- 3
- 492
- Pages: 100-109
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 9
- 530
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 2
- 511
- Pages: 21-29