Publication schedule
-
№1 March 2026
Articles by keywords "detection"
Automation of information security incident detection using custom correlation rules in a SIEM system
- Year: 2026
- Issue: 1
- 0
- 14
- Pages: 187-200
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
- Year: 2026
- Issue: 1
- 0
- 19
- Pages: 152-167
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 0
- 18
- Pages: 58-68
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 3
- 416
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 345
- Pages: 145-155
CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM
- Year: 2022
- Issue: 4
- 1
- 322
- Pages: 35-42
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 373
- Pages: 135-147
Segmenting data samples for Internet of Things devices security state analysis
- Year: 2021
- Issue: 3
- 0
- 382
- Pages: 130-136
An approach to detecting botnet attacks in the Internet of Things networks
- Year: 2021
- Issue: 3
- 0
- 399
- Pages: 108-117
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 454
- Pages: 27-33
ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
- Year: 2022
- Issue: 2
- 1
- 356
- Pages: 51-64
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 1
- 502
- Pages: 127-134
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 462
- Pages: 74-81
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 535
- Pages: 48-56
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 535
- Pages: 21-40
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 591
- Pages: 117-130
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 508
- Pages: 62-78
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 1
- 552
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 498
- Pages: 39-49
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 2
- 504
- Pages: 39-50
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 479
- Pages: 157-164
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 485
- Pages: 65-75
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 535
- Pages: 130-137
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 567
- Pages: 68-76
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 585
- Pages: 134-141
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 659
- Pages: 51-57
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 582
- Pages: 104-110
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 563
- Pages: 37-45
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 608
- Pages: 9-17
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 652
- Pages: 124-133
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 13
- 697
- Pages: 82-98
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 3
- 661
- Pages: 69-81
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 713
- Pages: 112-120
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 4
- 635
- Pages: 86-95
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 7
- 734
- Pages: 41-59
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 653
- Pages: 132-144
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 19
- 766
- Pages: 20-29
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 715
- Pages: 69-82
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 10
- 733
- Pages: 59-68