Articles by keywords "analysis"

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 0
  • 152
  • Pages: 72-83

Risk assessment of the use of open source projects: a method for analyzing metrics of the development process

Software security
  • Year: 2023
  • Issue: 4
  • 0
  • 134
  • Pages: 61-71

Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 3
  • 1
  • 158
  • Pages: 126-137

Agent-based modelling information distribution in social-information internet services

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 0
  • 154
  • Pages: 90-102

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 138
  • Pages: 70-81

AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS

Applied cryptography
  • Year: 2022
  • Issue: 3
  • 3
  • 158
  • Pages: 45-54

Risk assessment of using open source projects: analysis of existing approaches

Software security
  • Year: 2023
  • Issue: 3
  • 1
  • 172
  • Pages: 58-69

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 153
  • Pages: 33-57

Encrypted files detection algorithm

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 213
  • Pages: 16-26

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 1
  • 186
  • Pages: 9-15

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 1
  • 256
  • Pages: 118-126

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 310
  • Pages: 117-130

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 303
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 281
  • Pages: 39-49

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 283
  • Pages: 112-122

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 0
  • 262
  • Pages: 9-25

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 284
  • Pages: 65-75

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 300
  • Pages: 9-21

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 2
  • 323
  • Pages: 169-177

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 376
  • Pages: 68-76

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 412
  • Pages: 57-65

Intelligent mechanisms for extracting features of file modification in dynamic virus analysis

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 1
  • 0
  • 415
  • Pages: 153-167

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 440
  • Pages: 51-57

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 5
  • 415
  • Pages: 32-40

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 408
  • Pages: 28-35

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 408
  • Pages: 9-17

The use of convolutional neural networks to enhance the security of steganographic methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 461
  • Pages: 134-144

Detection of fake news spread using machine learning

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 449
  • Pages: 82-98

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 449
  • Pages: 69-81

Using entropy metrics to detect data integrity attacks in real-time

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 416
  • Pages: 48-57

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 3
  • 430
  • Pages: 86-95

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 5
  • 463
  • Pages: 41-59

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 5
  • 479
  • Pages: 83-96

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 5
  • 517
  • Pages: 69-80

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 498
  • Pages: 69-82