Publication schedule
  • №1 March 2026

Articles by keywords "attack"

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • Year: 2026
  • Issue: 1
  • 0
  • 19
  • Pages: 152-167

Multi-level model of secure interoperability in e-commerce based on a security profile

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 0
  • 16
  • Pages: 123-133

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 0
  • 18
  • Pages: 58-68

A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions

Information security application
  • Year: 2026
  • Issue: 1
  • 1
  • 24
  • Pages: 15-30

Adversarial attacks against a machine learning based intrusion detection system

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 3
  • 415
  • Pages: 156-190

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 345
  • Pages: 145-155

Attack detection by artificial neural networks

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 1
  • 377
  • Pages: 84-94

A method of responding to targeted attacks based on the mapping of information security events using indication signatures

Information security application
  • Year: 2023
  • Issue: 4
  • 13
  • 397
  • Pages: 48-60

METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 351
  • Pages: 28-34

Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 349
  • Pages: 163-172

A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 354
  • Pages: 123-139

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 356
  • Pages: 107-122

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • Year: 2023
  • Issue: 2
  • 5
  • 459
  • Pages: 82-91

PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 1
  • 367
  • Pages: 148-159

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 414
  • Pages: 118-129

An approach to detecting botnet attacks in the Internet of Things networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 399
  • Pages: 108-117

MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 368
  • Pages: 73-81

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 1
  • 356
  • Pages: 51-64

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 9
  • 484
  • Pages: 163-183

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 10
  • 424
  • Pages: 76-88

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 18
  • 437
  • Pages: 23-34

Protection against HID attacks

Special IT
  • Year: 2021
  • Issue: 2
  • 3
  • 540
  • Pages: 104-108

Security threat model of network domain name service when implementing attacking scenarios

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 525
  • Pages: 65-73

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 530
  • Pages: 57-64

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 535
  • Pages: 48-56

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 3
  • 521
  • Pages: 41-47

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 535
  • Pages: 21-40

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 519
  • Pages: 86-95

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 508
  • Pages: 79-85

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 508
  • Pages: 62-78

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 552
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 496
  • Pages: 39-49

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 2
  • 504
  • Pages: 39-50

Using adversarial attacks to protect against automatic text recognition in CAPTCHA services

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 510
  • Pages: 165-175

Intelligent recommender system for counteracting network attacks

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 479
  • Pages: 24-30

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 14
  • 599
  • Pages: 138-151

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 1
  • 514
  • Pages: 104-116

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 486
  • Pages: 95-103

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 624
  • Pages: 9-19

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • Year: 2022
  • Issue: 1
  • 4
  • 595
  • Pages: 96-109

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 554
  • Pages: 77-84

ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS

Information security aspects
  • Year: 2022
  • Issue: 1
  • 2
  • 633
  • Pages: 11-17

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 612
  • Pages: 80-95

Protection against adversarial attacks on image recognition systems using an autoencoder

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 3
  • 588
  • Pages: 119-127

DDoS attacks detection based on a modular neural network

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 583
  • Pages: 111-118

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 582
  • Pages: 104-110

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 609
  • Pages: 28-35

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 563
  • Pages: 37-45

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 617
  • Pages: 9-16

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 673
  • Pages: 168-178

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 6
  • 647
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 651
  • Pages: 124-133

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 5
  • 701
  • Pages: 34-47

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 712
  • Pages: 112-120

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 4
  • 655
  • Pages: 35-40

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 24
  • 799
  • Pages: 147-164

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 23
  • 824
  • Pages: 110-120

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 712
  • Pages: 91-99

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 10
  • 733
  • Pages: 59-68

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 13
  • 787
  • Pages: 43-58