Articles by keywords "attack"
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
- Year: 2026
- Issue: 1
- 11
- 296
- Pages: 152-167
Multi-level model of secure interoperability in e-commerce based on a security profile
- Year: 2026
- Issue: 1
- 4
- 269
- Pages: 123-133
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 6
- 271
- Pages: 58-68
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 6
- 642
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 3
- 549
- Pages: 145-155
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
- Year: 2023
- Issue: 4
- 15
- 594
- Pages: 48-60
METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS
- Year: 2022
- Issue: 4
- 4
- 542
- Pages: 28-34
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
- Year: 2023
- Issue: 2
- 0
- 533
- Pages: 163-172
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 543
- Pages: 123-139
Cyber resiliency support based on methods of graph analysis and functional network virtualization
- Year: 2023
- Issue: 2
- 0
- 533
- Pages: 107-122
Bitcoin Core cryptocurrency wallet cryptographic security analysis
- Year: 2023
- Issue: 2
- 5
- 732
- Pages: 82-91
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 536
- Pages: 148-159
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 594
- Pages: 108-117
MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 0
- 536
- Pages: 73-81
ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 1
- 523
- Pages: 51-64
Determining the optimal response time to information security threats in a limited resource environment
- Year: 2025
- Issue: 4
- 24
- 635
- Pages: 23-34
Security threat model of network domain name service when implementing attacking scenarios
- Year: 2021
- Issue: 2
- 2
- 714
- Pages: 65-73
Implementation of honeypot systems based on potential attack graph
- Year: 2021
- Issue: 2
- 1
- 734
- Pages: 57-64
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 747
- Pages: 48-56
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
- Year: 2021
- Issue: 2
- 3
- 717
- Pages: 41-47
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 746
- Pages: 21-40
New regular sliding window algorithms for elliptic curve scalar point multiplication
- Year: 2021
- Issue: 1
- 1
- 724
- Pages: 86-95
Countering information threats using honeypot systems based on graph of potential attacks
- Year: 2021
- Issue: 1
- 2
- 722
- Pages: 79-85
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 2
- 747
- Pages: 62-78
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 2
- 766
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 697
- Pages: 39-49
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 2
- 694
- Pages: 39-50
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 2
- 701
- Pages: 165-175
Intelligent recommender system for counteracting network attacks
- Year: 2024
- Issue: Спецвыпуск
- 0
- 661
- Pages: 24-30
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 25
- 846
- Pages: 138-151
Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats
- Year: 2024
- Issue: 2
- 1
- 696
- Pages: 104-116
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 664
- Pages: 95-103
MITIGATION OF SPECULATIVE EXECUTION ATTACKS BY INTEL DAL TECHNOLOGY APPLICATION
- Year: 2022
- Issue: 2
- 1
- 829
- Pages: 9-19
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 771
- Pages: 96-109
ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS
- Year: 2022
- Issue: 1
- 2
- 818
- Pages: 11-17
Protection against adversarial attacks on image recognition systems using an autoencoder
- Year: 2023
- Issue: 1
- 3
- 753
- Pages: 119-127
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 757
- Pages: 104-110
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 2
- 779
- Pages: 28-35
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 3
- 741
- Pages: 37-45
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 3
- 796
- Pages: 9-16
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 5
- 865
- Pages: 168-178
Information model for countering the illegal distribution of personal data in information systems
- Year: 2025
- Issue: Спецвыпуск
- 7
- 833
- Pages: 156-167
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 842
- Pages: 124-133
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 6
- 899
- Pages: 34-47
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 918
- Pages: 112-120
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 6
- 847
- Pages: 35-40
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 26
- 1014
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 25
- 1028
- Pages: 110-120
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 16
- 949
- Pages: 59-68
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 983
- Pages: 43-58