Articles by keywords "Model"
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 137
- Pages: 145-155
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
- Year: 2023
- Issue: 4
- 0
- 136
- Pages: 133-144
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 0
- 146
- Pages: 9-18
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
- Year: 2023
- Issue: 3
- 0
- 148
- Pages: 82-89
SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM
- Year: 2022
- Issue: 3
- 0
- 147
- Pages: 130-142
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 149
- Pages: 36-44
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 147
- Pages: 9-23
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 0
- 153
- Pages: 191-201
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
- Year: 2023
- Issue: 2
- 0
- 148
- Pages: 150-162
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 189
- Pages: 137-144
Development of a metric model of information events in the information security management system of economic activities
- Year: 2021
- Issue: 3
- 0
- 201
- Pages: 96-107
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 166
- Pages: 73-81
IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION
- Year: 2022
- Issue: 2
- 0
- 173
- Pages: 65-72
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 1
- 186
- Pages: 9-15
A model for implementing artificial intelligence into embedded systems
- Year: 2025
- Issue: 4
- 6
- 200
- Pages: 35-47
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 308
- Pages: 109-117
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 0
- 281
- Pages: 96-101
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 252
- Pages: 91-100
Optimization of the performance of the search information system in the legislative documents database
- Year: 2024
- Issue: 4
- 1
- 285
- Pages: 152-161
A protection method for the global model of the federated learning systems based on a trust model
- Year: 2024
- Issue: 4
- 1
- 295
- Pages: 94-108
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 1
- 322
- Pages: 74-84
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 0
- 282
- Pages: 63-73
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 1
- 325
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 0
- 286
- Pages: 109-126
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 5
- 325
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 301
- Pages: 130-137
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 413
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 442
- Pages: 20-30
Reconfiguration of the system development model information security management: interaction of base modules with the operator
- Year: 2024
- Issue: 2
- 3
- 412
- Pages: 9-19
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 415
- Pages: 153-167
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 401
- Pages: 134-141
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 1
- 406
- Pages: 27-36
Current trends in methods of operational automation of data processing
- Year: 2023
- Issue: 1
- 0
- 371
- Pages: 79-87
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 408
- Pages: 28-35
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 3
- 443
- Pages: 18-27
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 4
- 441
- Pages: 168-178
Hiding data in audio files using coverless steganography methods
- Year: 2025
- Issue: Спецвыпуск
- 15
- 493
- Pages: 145-155
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 4
- 547
- Pages: 58-68
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 441
- Pages: 34-47
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 433
- Pages: 35-40
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 454
- Pages: 132-144
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 18
- 564
- Pages: 110-120
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
- Year: 2025
- Issue: 3
- 6
- 498
- Pages: 81-90
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 17
- 530
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 40
- 659
- Pages: 9-19
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 9
- 533
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 2
- 514
- Pages: 21-29
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 7
- 522
- Pages: 9-20