Publication schedule
  • №1 March 2026

Articles by keywords "Metric"

Identification of a person in uniform based on video stream data using the YOLO convolutional neural network

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 0
  • 15
  • Pages: 176-186

VOICE IDENTIFICATION METHOD BASED ON MACHINE LEARNING

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 341
  • Pages: 143-154

A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY

Critical information infrastructure security
  • Year: 2022
  • Issue: 3
  • 1
  • 340
  • Pages: 68-79

Development of a metric model of information events in the information security management system of economic activities

Critical information infrastructure security
  • Year: 2021
  • Issue: 3
  • 0
  • 424
  • Pages: 96-107

DIGITALIZATION AND IDENTIFICATION OF ECG SIGNALS USING WAVELET TECHNOLOGIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 363
  • Pages: 82-97

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 591
  • Pages: 117-130

Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems

Information security application
  • Year: 2024
  • Issue: 2
  • 3
  • 600
  • Pages: 44-56

Application of machine learning methods in the problem of searching area of interest for biometric identification based on the pattern of palm veins

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 572
  • Pages: 128-138

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 5
  • 701
  • Pages: 34-47

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 10
  • 698
  • Pages: 9-20

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 19
  • 766
  • Pages: 20-29