Articles by keywords "attack"

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • Year: 2026
  • Issue: 1
  • 11
  • 296
  • Pages: 152-167

Multi-level model of secure interoperability in e-commerce based on a security profile

Network and telecommunication security
  • Year: 2026
  • Issue: 1
  • 4
  • 269
  • Pages: 123-133

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 6
  • 271
  • Pages: 58-68

A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions

Information security application
  • Year: 2026
  • Issue: 1
  • 16
  • 253
  • Pages: 15-30

Adversarial attacks against a machine learning based intrusion detection system

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 6
  • 642
  • Pages: 156-190

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 3
  • 549
  • Pages: 145-155

Attack detection by artificial neural networks

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 1
  • 566
  • Pages: 84-94

A method of responding to targeted attacks based on the mapping of information security events using indication signatures

Information security application
  • Year: 2023
  • Issue: 4
  • 15
  • 594
  • Pages: 48-60

METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS

Information security application
  • Year: 2022
  • Issue: 4
  • 4
  • 542
  • Pages: 28-34

Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 533
  • Pages: 163-172

A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 543
  • Pages: 123-139

Cyber resiliency support based on methods of graph analysis and functional network virtualization

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 533
  • Pages: 107-122

Bitcoin Core cryptocurrency wallet cryptographic security analysis

Applied cryptography
  • Year: 2023
  • Issue: 2
  • 5
  • 732
  • Pages: 82-91

PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 1
  • 536
  • Pages: 148-159

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 613
  • Pages: 118-129

An approach to detecting botnet attacks in the Internet of Things networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 594
  • Pages: 108-117

MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 0
  • 536
  • Pages: 73-81

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 1
  • 523
  • Pages: 51-64

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 12
  • 722
  • Pages: 163-183

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 11
  • 623
  • Pages: 76-88

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 24
  • 635
  • Pages: 23-34

Protection against HID attacks

Special IT
  • Year: 2021
  • Issue: 2
  • 5
  • 762
  • Pages: 104-108

Security threat model of network domain name service when implementing attacking scenarios

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 714
  • Pages: 65-73

Implementation of honeypot systems based on potential attack graph

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 734
  • Pages: 57-64

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 747
  • Pages: 48-56

Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 3
  • 717
  • Pages: 41-47

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 746
  • Pages: 21-40

New regular sliding window algorithms for elliptic curve scalar point multiplication

Applied cryptography
  • Year: 2021
  • Issue: 1
  • 1
  • 724
  • Pages: 86-95

Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 2
  • 722
  • Pages: 79-85

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 2
  • 747
  • Pages: 62-78

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 2
  • 766
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 697
  • Pages: 39-49

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 2
  • 694
  • Pages: 39-50

Using adversarial attacks to protect against automatic text recognition in CAPTCHA services

  • Year: 2024
  • Issue: Спецвыпуск
  • 2
  • 701
  • Pages: 165-175

Intelligent recommender system for counteracting network attacks

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 661
  • Pages: 24-30

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 25
  • 846
  • Pages: 138-151

Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 1
  • 696
  • Pages: 104-116

Ensuring information security of vanets based on early detection of malicious nodes

Critical information infrastructure security
  • Year: 2024
  • Issue: 2
  • 0
  • 664
  • Pages: 95-103

MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION

Information security application
  • Year: 2022
  • Issue: 2
  • 1
  • 829
  • Pages: 9-19

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • Year: 2022
  • Issue: 1
  • 4
  • 771
  • Pages: 96-109

SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 719
  • Pages: 77-84

ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS

Information security aspects
  • Year: 2022
  • Issue: 1
  • 2
  • 818
  • Pages: 11-17

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 813
  • Pages: 80-95

Protection against adversarial attacks on image recognition systems using an autoencoder

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 3
  • 753
  • Pages: 119-127

DDoS attacks detection based on a modular neural network

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 752
  • Pages: 111-118

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 757
  • Pages: 104-110

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 2
  • 779
  • Pages: 28-35

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 741
  • Pages: 37-45

ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 796
  • Pages: 9-16

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 5
  • 865
  • Pages: 168-178

Information model for countering the illegal distribution of personal data in information systems

  • Year: 2025
  • Issue: Спецвыпуск
  • 7
  • 833
  • Pages: 156-167

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 842
  • Pages: 124-133

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 6
  • 899
  • Pages: 34-47

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 918
  • Pages: 112-120

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 847
  • Pages: 35-40

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 26
  • 1014
  • Pages: 147-164

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 25
  • 1028
  • Pages: 110-120

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 7
  • 888
  • Pages: 91-99

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 16
  • 949
  • Pages: 59-68

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 13
  • 983
  • Pages: 43-58