Articles by keywords "detection"
IoT devices analysis using neural networks ensemble trained on unbalanced sample
- Year: 2021
- Issue: 2
- 0
- 87
- Pages: 127-134
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 0
- 86
- Pages: 74-81
Adversarial attacks on intrusion detection systems using LSTM classifier
- Year: 2021
- Issue: 2
- 0
- 90
- Pages: 48-56
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 1
- 100
- Pages: 21-40
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 1
- 0
- 107
- Pages: 117-130
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 97
- Pages: 62-78
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 0
- 103
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 97
- Pages: 39-49
Predicting network attacks on IoT systems using regression analysis
- Year: 2021
- Issue: 4
- 0
- 88
- Pages: 39-50
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 0
- 89
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 109
- Pages: 157-164
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 111
- Pages: 65-75
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 122
- Pages: 130-137
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
- Year: 2022
- Issue: 1
- 0
- 202
- Pages: 68-76
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 230
- Pages: 134-141
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
- Year: 2022
- Issue: 1
- 1
- 237
- Pages: 51-57
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 222
- Pages: 104-110
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
- Year: 2023
- Issue: 1
- 0
- 214
- Pages: 37-45
Steganalytical modulе for insert detection in low stego-payload images
- Year: 2024
- Issue: 1
- 0
- 234
- Pages: 9-17
The architecture of a software package for wireless ad-hoc network protection from active network attacks
- Year: 2025
- Issue: Спецвыпуск
- 0
- 241
- Pages: 124-133
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 4
- 254
- Pages: 82-98
Data processing and mining to detect a data privacy violations from internal intruder in a DBMS
- Year: 2025
- Issue: Спецвыпуск
- 1
- 251
- Pages: 69-81
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 278
- Pages: 112-120
Identification of honeypot-systems on the basis of complex analysis of node performance indicators
- Year: 2025
- Issue: 2
- 3
- 257
- Pages: 86-95
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 5
- 276
- Pages: 41-59
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 280
- Pages: 132-144
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 11
- 334
- Pages: 20-29
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 317
- Pages: 69-82
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 7
- 313
- Pages: 59-68