Articles by keywords "attack"

Protection against HID attacks

Special IT
  • Year: 2021
  • Issue: 2
  • 0
  • 77
  • Pages: 104-108

Security threat model of network domain name service when implementing attacking scenarios

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 78
  • Pages: 65-73

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 78
  • Pages: 57-64

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 79
  • Pages: 48-56

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 79
  • Pages: 41-47

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 86
  • Pages: 21-40

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 85
  • Pages: 86-95

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 82
  • Pages: 79-85

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 86
  • Pages: 62-78

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 91
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 85
  • Pages: 39-49

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 0
  • 77
  • Pages: 39-50

Using adversarial attacks to protect against automatic text recognition in CAPTCHA services

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 100
  • Pages: 165-175

Intelligent recommender system for counteracting network attacks

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 100
  • Pages: 24-30

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 11
  • 174
  • Pages: 138-151

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 108
  • Pages: 104-116

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 107
  • Pages: 95-103

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 207
  • Pages: 9-19

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • Year: 2022
  • Issue: 1
  • 2
  • 198
  • Pages: 96-109

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 191
  • Pages: 77-84

ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS

Information security aspects
  • Year: 2022
  • Issue: 1
  • 0
  • 221
  • Pages: 11-17

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 218
  • Pages: 80-95

PROTECTION AGAINST ADVERSARIAL ATTACKS ON IMAGE RECOGNITION SYSTEMS USING AN AUTOENCODER

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 213
  • Pages: 119-127

DDOS ATTACKS DETECTION BASED ON A MODULAR NEURAL NETWORK

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 211
  • Pages: 111-118

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 209
  • Pages: 104-110

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 214
  • Pages: 28-35

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 202
  • Pages: 37-45

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 1
  • 215
  • Pages: 9-17

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 238
  • Pages: 168-178

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 1
  • 236
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 228
  • Pages: 124-133

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 241
  • Pages: 34-47

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 4
  • 260
  • Pages: 112-120

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 247
  • Pages: 35-40

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 12
  • 349
  • Pages: 147-164

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 11
  • 337
  • Pages: 110-120

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 6
  • 295
  • Pages: 91-99

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 7
  • 299
  • Pages: 59-68

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 6
  • 318
  • Pages: 43-58