Publication schedule
-
№1 March 2026
Articles by keywords "attack"
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
- Year: 2026
- Issue: 1
- 0
- 19
- Pages: 152-167
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 0
- 16
- Pages: 123-133
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 0
- 18
- Pages: 58-68
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 3
- 415
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 345
- Pages: 145-155
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
- Year: 2023
- Issue: 4
- 13
- 397
- Pages: 48-60
METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS
- Year: 2022
- Issue: 4
- 1
- 351
- Pages: 28-34
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
- Year: 2023
- Issue: 2
- 0
- 349
- Pages: 163-172
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 354
- Pages: 123-139
Cyber resiliency support based on methods of graph analysis and functional network virtualization
- Year: 2023
- Issue: 2
- 0
- 356
- Pages: 107-122
Bitcoin Core cryptocurrency wallet cryptographic security analysis
- Year: 2023
- Issue: 2
- 5
- 459
- Pages: 82-91
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 367
- Pages: 148-159
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 399
- Pages: 108-117
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 368
- Pages: 73-81
ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 1
- 356
- Pages: 51-64
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 18
- 437
- Pages: 23-34
Security threat model of network domain name service when implementing attacking scenarios
- Year: 2021
- Issue: 2
- 1
- 525
- Pages: 65-73
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 530
- Pages: 57-64
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 535
- Pages: 48-56
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 3
- 521
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 535
- Pages: 21-40
New regular sliding window algorithms for elliptic curve scalar point multiplication
- Year: 2021
- Issue: 1
- 1
- 519
- Pages: 86-95
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 1
- 508
- Pages: 79-85
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 508
- Pages: 62-78
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 1
- 552
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 496
- Pages: 39-49
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 2
- 504
- Pages: 39-50
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 1
- 510
- Pages: 165-175
Intelligent recommender system for counteracting network attacks
- Year: 2024
- Issue: Спецвыпуск
- 0
- 479
- Pages: 24-30
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 14
- 599
- Pages: 138-151
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 1
- 514
- Pages: 104-116
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 486
- Pages: 95-103
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 624
- Pages: 9-19
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 595
- Pages: 96-109
ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS
- Year: 2022
- Issue: 1
- 2
- 633
- Pages: 11-17
Protection against adversarial attacks on image recognition systems using an autoencoder
- Year: 2023
- Issue: 1
- 3
- 588
- Pages: 119-127
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 582
- Pages: 104-110
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 609
- Pages: 28-35
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 563
- Pages: 37-45
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 3
- 617
- Pages: 9-16
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 4
- 673
- Pages: 168-178
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 6
- 647
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 651
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 5
- 701
- Pages: 34-47
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 712
- Pages: 112-120
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 4
- 655
- Pages: 35-40
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 24
- 799
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 23
- 824
- Pages: 110-120
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 10
- 733
- Pages: 59-68
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 787
- Pages: 43-58