Articles by keywords "detection"

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 0
  • 16
  • Pages: 134-141

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 0
  • 16
  • Pages: 51-57

THE HYBRID METHOD FOR EVASION ATTACKS DETECTION IN THE MACHINE LEARNING SYSTEMS

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 16
  • Pages: 104-110

A METHOD FOR DETECTING MANIPULATION ATTACKS ON RECOMMENDATION SYSTEMS WITH COLLABORATIVE FILTERING

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 16
  • Pages: 37-45

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 18
  • Pages: 9-17

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 27
  • Pages: 124-133

Detection of fake news spread using machine learning

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 25
  • Pages: 82-98

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 25
  • Pages: 69-81

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 36
  • Pages: 112-120

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 1
  • 38
  • Pages: 86-95

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 44
  • Pages: 41-59

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 62
  • Pages: 132-144

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 4
  • 93
  • Pages: 20-29

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 2
  • 98
  • Pages: 69-82

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 1
  • 91
  • Pages: 59-68