Articles by keywords "Model"

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 137
  • Pages: 145-155

Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 136
  • Pages: 133-144

Decentralized messaging systems threat model

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 0
  • 153
  • Pages: 105-115

Substantiation of the rational composition of the information security system

Information security aspects
  • Year: 2023
  • Issue: 4
  • 0
  • 146
  • Pages: 9-18

Balance production models with information security

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2023
  • Issue: 3
  • 0
  • 146
  • Pages: 138-147

Ranking model of the system of compromise indicators of nodes of a corporate data transmission network

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 148
  • Pages: 82-89

SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 147
  • Pages: 130-142

A MODEL OF DIFFERENTIATION OF ACCESS RIGHTS FOR A VIRTUAL SQUAD OF UNMANNED AERIAL VEHICLES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 151
  • Pages: 121-129

METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 149
  • Pages: 36-44

INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS

Information security application
  • Year: 2022
  • Issue: 3
  • 0
  • 147
  • Pages: 9-23

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 153
  • Pages: 33-57

Artificial neural networks in the navigation safety system of autonomous unmanned vessels

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 2
  • 0
  • 153
  • Pages: 191-201

Cybersecurity assessment of cyber-physical system based on analysis of malware signatures

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 148
  • Pages: 150-162

Approaches to building situational control systems for cyberphysical systems overview

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 189
  • Pages: 137-144

THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 162
  • Pages: 106-124

Development of a metric model of information events in the information security management system of economic activities

Critical information infrastructure security
  • Year: 2021
  • Issue: 3
  • 0
  • 201
  • Pages: 96-107

MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 166
  • Pages: 73-81

Fake posts detection using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 3
  • 0
  • 189
  • Pages: 34-43

IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 173
  • Pages: 65-72

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 1
  • 186
  • Pages: 9-15

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 0
  • 197
  • Pages: 163-183

A model for implementing artificial intelligence into embedded systems

Cyber-physic systems security
  • Year: 2025
  • Issue: 4
  • 6
  • 200
  • Pages: 35-47

Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks

Information security application
  • Year: 2025
  • Issue: 4
  • 14
  • 266
  • Pages: 9-22

Model for forming development program of organization’s information security system

Special IT
  • Year: 2021
  • Issue: 2
  • 5
  • 308
  • Pages: 109-117

Efficiency of computer network functioning in conditions of malicious information influences

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 281
  • Pages: 96-101

Use of agile management tools in projects of information security systems implementation

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2021
  • Issue: 4
  • 0
  • 255
  • Pages: 123-136

Development of a mechanism to control message integrity on the local network of vehicles

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 0
  • 252
  • Pages: 91-100

Optimization of the performance of the search information system in the legislative documents database

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 1
  • 285
  • Pages: 152-161

A protection method for the global model of the federated learning systems based on a trust model

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 4
  • 1
  • 295
  • Pages: 94-108

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 1
  • 322
  • Pages: 74-84

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 282
  • Pages: 63-73

Approach to creating personalised LLM agents based on MBTI personality traits

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 325
  • Pages: 127-141

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 286
  • Pages: 109-126

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 5
  • 325
  • Pages: 30-39

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 0
  • 301
  • Pages: 130-137

PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 1
  • 373
  • Pages: 121-131

METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 2
  • 368
  • Pages: 110-120

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 2
  • 0
  • 401
  • Pages: 66-72

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 413
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 5
  • 442
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 3
  • 412
  • Pages: 9-19

Intelligent mechanisms for extracting features of file modification in dynamic virus analysis

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 1
  • 0
  • 415
  • Pages: 153-167

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 401
  • Pages: 134-141

Accounting for the impact of the human factor in cyber security models

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 406
  • Pages: 27-36

Current trends in methods of operational automation of data processing

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 1
  • 0
  • 371
  • Pages: 79-87

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 408
  • Pages: 28-35

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 443
  • Pages: 18-27

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 441
  • Pages: 168-178

Hiding data in audio files using coverless steganography methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 15
  • 493
  • Pages: 145-155

Application of large language models in event forecasting field

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 547
  • Pages: 58-68

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 441
  • Pages: 34-47

Combination of methods of selective teacher intervention in the student’s learning process and low-rank adaptation in the knowledge distillation model

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 2
  • 494
  • Pages: 121-130

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 433
  • Pages: 35-40

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 454
  • Pages: 132-144

Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 5
  • 522
  • Pages: 121-146

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 18
  • 564
  • Pages: 110-120

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 493
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 6
  • 498
  • Pages: 81-90

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 17
  • 530
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 40
  • 659
  • Pages: 9-19

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 9
  • 533
  • Pages: 43-58

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 2
  • 514
  • Pages: 21-29

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 7
  • 522
  • Pages: 9-20