Publication schedule
  • №1 March 2026

Articles by keywords "detection"

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 0
  • 14
  • Pages: 187-200

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • Year: 2026
  • Issue: 1
  • 0
  • 19
  • Pages: 152-167

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 0
  • 18
  • Pages: 58-68

Adversarial attacks against a machine learning based intrusion detection system

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 3
  • 416
  • Pages: 156-190

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 345
  • Pages: 145-155

Attack detection by artificial neural networks

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 1
  • 377
  • Pages: 84-94

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 3
  • 385
  • Pages: 72-83

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 339
  • Pages: 70-81

CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 322
  • Pages: 35-42

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 2
  • 1
  • 364
  • Pages: 202-211

COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 373
  • Pages: 135-147

Segmenting data samples for Internet of Things devices security state analysis

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 382
  • Pages: 130-136

An approach to detecting botnet attacks in the Internet of Things networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 399
  • Pages: 108-117

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 454
  • Pages: 27-33

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 1
  • 356
  • Pages: 51-64

Software for detecting potentially dangerous items at mass event entries using computer vision

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2025
  • Issue: 4
  • 4
  • 392
  • Pages: 110-120

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 1
  • 502
  • Pages: 127-134

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 462
  • Pages: 74-81

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 535
  • Pages: 48-56

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 535
  • Pages: 21-40

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 591
  • Pages: 117-130

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 508
  • Pages: 62-78

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 552
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 498
  • Pages: 39-49

Dynamic phishing website dataset collection

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 515
  • Pages: 31-38

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 2
  • 534
  • Pages: 112-122

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 2
  • 504
  • Pages: 39-50

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 503
  • Pages: 9-25

Methodology for finding errors and nondeclared features in software

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 479
  • Pages: 157-164

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 485
  • Pages: 65-75

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 1
  • 535
  • Pages: 130-137

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 567
  • Pages: 68-76

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 585
  • Pages: 134-141

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 659
  • Pages: 51-57

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 582
  • Pages: 104-110

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 563
  • Pages: 37-45

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 608
  • Pages: 9-17

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 652
  • Pages: 124-133

Detection of fake news spread using machine learning

  • Year: 2025
  • Issue: Спецвыпуск
  • 13
  • 697
  • Pages: 82-98

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 661
  • Pages: 69-81

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 713
  • Pages: 112-120

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 4
  • 635
  • Pages: 86-95

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 7
  • 734
  • Pages: 41-59

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 653
  • Pages: 132-144

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 19
  • 766
  • Pages: 20-29

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 715
  • Pages: 69-82

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 10
  • 733
  • Pages: 59-68