Articles by keywords "algorithm"

Model for forming development program of organization’s information security system

Special IT
  • Year: 2021
  • Issue: 2
  • 2
  • 102
  • Pages: 109-117

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 86
  • Pages: 41-47

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 93
  • Pages: 86-95

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 92
  • Pages: 62-78

Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 88
  • Pages: 20-30

A concept of the protected distributed ledger technology for smart city digital environment

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 115
  • Pages: 10-16

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 221
  • Pages: 37-46

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 1
  • 243
  • Pages: 156-167

An automated method for assessing the correctness of distributed algorithms using chaos engineering testing

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 238
  • Pages: 99-111

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 270
  • Pages: 112-120

On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • Year: 2025
  • Issue: 3
  • 13
  • 327
  • Pages: 180-191

Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 1
  • 298
  • Pages: 100-109

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 5
  • 317
  • Pages: 69-80