Articles by keywords "Method"
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
- Year: 2023
- Issue: 3
- 1
- 542
- Pages: 82-89
Methods of monitoring the execution of the security pattern in infocommunication systems
- Year: 2023
- Issue: 2
- 0
- 550
- Pages: 61-72
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 542
- Pages: 135-147
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 594
- Pages: 108-117
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 611
- Pages: 9-15
Development of a data hashing method based on cellular automation and its advantages
- Year: 2021
- Issue: 4
- 0
- 709
- Pages: 51-60
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 668
- Pages: 157-164
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 704
- Pages: 9-21
Ways to obtain evidential information from a computer using Open Source
- Year: 2024
- Issue: 3
- 4
- 712
- Pages: 58-68
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 2
- 695
- Pages: 178-193
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 771
- Pages: 96-109
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 799
- Pages: 57-65
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
- Year: 2022
- Issue: 1
- 1
- 744
- Pages: 58-67
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 757
- Pages: 104-110
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 802
- Pages: 9-17
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 12
- 1020
- Pages: 41-59
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 26
- 1014
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 25
- 1028
- Pages: 110-120
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
- Year: 2025
- Issue: 3
- 3
- 894
- Pages: 100-109
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 983
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 6
- 925
- Pages: 21-29