Articles by keywords "attack"
Security threat model of network domain name service when implementing attacking scenarios
- Year: 2021
- Issue: 2
- 0
- 78
- Pages: 65-73
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 78
- Pages: 57-64
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 79
- Pages: 48-56
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 1
- 79
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 1
- 86
- Pages: 21-40
New regular sliding window algorithms for elliptic curve scalar point multiplication
- Year: 2021
- Issue: 1
- 1
- 85
- Pages: 86-95
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 0
- 82
- Pages: 79-85
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 86
- Pages: 62-78
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 0
- 91
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 85
- Pages: 39-49
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 0
- 77
- Pages: 39-50
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 0
- 100
- Pages: 165-175
Intelligent recommender system for counteracting network attacks
- Year: 2024
- Issue: Спецвыпуск
- 0
- 100
- Pages: 24-30
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 11
- 174
- Pages: 138-151
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 0
- 108
- Pages: 104-116
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 107
- Pages: 95-103
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 207
- Pages: 9-19
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 2
- 198
- Pages: 96-109
ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS
- Year: 2022
- Issue: 1
- 0
- 221
- Pages: 11-17
PROTECTION AGAINST ADVERSARIAL ATTACKS ON IMAGE RECOGNITION SYSTEMS USING AN AUTOENCODER
- Year: 2023
- Issue: 1
- 2
- 213
- Pages: 119-127
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 209
- Pages: 104-110
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 1
- 214
- Pages: 28-35
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 202
- Pages: 37-45
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 1
- 215
- Pages: 9-17
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 3
- 238
- Pages: 168-178
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 1
- 236
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 228
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 241
- Pages: 34-47
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 4
- 260
- Pages: 112-120
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 247
- Pages: 35-40
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 12
- 349
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 11
- 337
- Pages: 110-120
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 7
- 299
- Pages: 59-68
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 6
- 318
- Pages: 43-58