Articles by keywords "detection"
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 0
- 16
- Pages: 134-141
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 0
- 16
- Pages: 51-57
THE HYBRID METHOD FOR EVASION ATTACKS DETECTION IN THE MACHINE LEARNING SYSTEMS
- Year: 2023
- Issue: 1
- 0
- 16
- Pages: 104-110
A METHOD FOR DETECTING MANIPULATION ATTACKS ON RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING
- Year: 2023
- Issue: 1
- 0
- 16
- Pages: 37-45
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 18
- Pages: 9-17
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 27
- Pages: 124-133
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 0
- 25
- Pages: 69-81
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 0
- 36
- Pages: 112-120
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 1
- 38
- Pages: 86-95
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 0
- 44
- Pages: 41-59
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 62
- Pages: 132-144
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 4
- 93
- Pages: 20-29
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 2
- 98
- Pages: 69-82
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 1
- 91
- Pages: 59-68