Articles by keywords "Model"
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 4
- 269
- Pages: 123-133
Analysis of information security issues in hyperconvergent infrastructure
- Year: 2026
- Issue: 1
- 6
- 260
- Pages: 87-98
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 6
- 271
- Pages: 58-68
Substantiation of the rational composition of the information security system
- Year: 2023
- Issue: 4
- 1
- 534
- Pages: 9-18
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 528
- Pages: 36-44
INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS
- Year: 2022
- Issue: 3
- 0
- 517
- Pages: 9-23
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 1
- 518
- Pages: 191-201
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
- Year: 2023
- Issue: 2
- 1
- 544
- Pages: 150-162
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 608
- Pages: 137-144
THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES
- Year: 2022
- Issue: 2
- 0
- 524
- Pages: 106-124
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 536
- Pages: 73-81
IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION
- Year: 2022
- Issue: 2
- 0
- 540
- Pages: 65-72
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 611
- Pages: 9-15
A model for implementing artificial intelligence into embedded systems
- Year: 2025
- Issue: 4
- 15
- 642
- Pages: 35-47
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 5
- 735
- Pages: 109-117
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 1
- 720
- Pages: 96-101
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 648
- Pages: 91-100
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 6
- 745
- Pages: 74-84
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 2
- 753
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 682
- Pages: 109-126
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 6
- 743
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 2
- 720
- Pages: 130-137
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
- Year: 2022
- Issue: 1
- 3
- 720
- Pages: 110-120
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 811
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 5
- 865
- Pages: 20-30
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 796
- Pages: 153-167
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 748
- Pages: 134-141
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 7
- 822
- Pages: 27-36
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 779
- Pages: 28-35
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 5
- 865
- Pages: 168-178
Hiding data in audio files using coverless steganography methods
- Year: 2025
- Issue: Спецвыпуск
- 18
- 939
- Pages: 145-155
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 17
- 1077
- Pages: 58-68
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 6
- 899
- Pages: 34-47
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 6
- 847
- Pages: 35-40
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 1
- 850
- Pages: 132-144
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 25
- 1028
- Pages: 110-120
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 24
- 964
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 52
- 1108
- Pages: 9-19
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 983
- Pages: 43-58
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 19
- 1003
- Pages: 9-20