Articles by keywords "analysis"
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 0
- 134
- Pages: 61-71
Agent-based modelling information distribution in social-information internet services
- Year: 2023
- Issue: 3
- 0
- 154
- Pages: 90-102
AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS
- Year: 2022
- Issue: 3
- 3
- 158
- Pages: 45-54
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 1
- 172
- Pages: 58-69
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 1
- 186
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 1
- 256
- Pages: 118-126
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 310
- Pages: 117-130
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 0
- 303
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 281
- Pages: 39-49
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 0
- 262
- Pages: 9-25
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 284
- Pages: 65-75
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 300
- Pages: 9-21
Detection of artificially synthesized audio files using graph neural networks
- Year: 2024
- Issue: 2
- 2
- 323
- Pages: 169-177
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 376
- Pages: 68-76
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 412
- Pages: 57-65
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 415
- Pages: 153-167
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 440
- Pages: 51-57
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 5
- 415
- Pages: 32-40
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 408
- Pages: 28-35
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 408
- Pages: 9-17
The use of convolutional neural networks to enhance the security of steganographic methods
- Year: 2025
- Issue: Спецвыпуск
- 2
- 461
- Pages: 134-144
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 4
- 449
- Pages: 82-98
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 2
- 449
- Pages: 69-81
Using entropy metrics to detect data integrity attacks in real-time
- Year: 2025
- Issue: Спецвыпуск
- 4
- 416
- Pages: 48-57
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 3
- 430
- Pages: 86-95
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 5
- 463
- Pages: 41-59
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 5
- 479
- Pages: 83-96
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 5
- 517
- Pages: 69-80
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 498
- Pages: 69-82