Articles by keywords "Method"

Ranking model of the system of compromise indicators of nodes of a corporate data transmission network

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 144
  • Pages: 82-89

Methods of monitoring the execution of the security pattern in infocommunication systems

Network and telecommunication security
  • Year: 2023
  • Issue: 2
  • 0
  • 147
  • Pages: 61-72

COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 184
  • Pages: 135-147

THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 158
  • Pages: 106-124

An approach to detecting botnet attacks in the Internet of Things networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 176
  • Pages: 108-117

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 1
  • 182
  • Pages: 9-15

Development of a data hashing method based on cellular automation and its advantages

Applied cryptography
  • Year: 2021
  • Issue: 4
  • 0
  • 275
  • Pages: 51-60

Methodology for finding errors and nondeclared features in software

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 271
  • Pages: 157-164

Automation of active power flows evaluation

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 4
  • 0
  • 261
  • Pages: 85-93

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 296
  • Pages: 9-21

Ways to obtain evidential information from a computer using Open Source

Information security application
  • Year: 2024
  • Issue: 3
  • 2
  • 314
  • Pages: 58-68

Authorship identification and verification using machine and deep learning methods

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 0
  • 295
  • Pages: 178-193

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • Year: 2022
  • Issue: 1
  • 4
  • 386
  • Pages: 96-109

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 408
  • Pages: 57-65

CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 383
  • Pages: 58-67

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 376
  • Pages: 104-110

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 404
  • Pages: 9-17

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 5
  • 460
  • Pages: 41-59

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 18
  • 567
  • Pages: 147-164

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 18
  • 561
  • Pages: 110-120

Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 3
  • 492
  • Pages: 100-109

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 4
  • 499
  • Pages: 40-54

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 9
  • 530
  • Pages: 43-58

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 2
  • 511
  • Pages: 21-29