Articles by keywords "detection"

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 0
  • 87
  • Pages: 127-134

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 86
  • Pages: 74-81

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 90
  • Pages: 48-56

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 100
  • Pages: 21-40

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 107
  • Pages: 117-130

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 97
  • Pages: 62-78

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 103
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 97
  • Pages: 39-49

Dynamic phishing website dataset collection

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 102
  • Pages: 31-38

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 102
  • Pages: 112-122

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 0
  • 88
  • Pages: 39-50

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 0
  • 89
  • Pages: 9-25

Methodology for finding errors and nondeclared features in software

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 109
  • Pages: 157-164

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 111
  • Pages: 65-75

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 0
  • 122
  • Pages: 130-137

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 0
  • 202
  • Pages: 68-76

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 230
  • Pages: 134-141

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 1
  • 237
  • Pages: 51-57

DDOS ATTACKS DETECTION BASED ON A MODULAR NEURAL NETWORK

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 224
  • Pages: 111-118

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 222
  • Pages: 104-110

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 0
  • 214
  • Pages: 37-45

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 234
  • Pages: 9-17

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 241
  • Pages: 124-133

Detection of fake news spread using machine learning

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 254
  • Pages: 82-98

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 1
  • 251
  • Pages: 69-81

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 278
  • Pages: 112-120

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 3
  • 257
  • Pages: 86-95

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 5
  • 276
  • Pages: 41-59

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 280
  • Pages: 132-144

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 11
  • 334
  • Pages: 20-29

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 317
  • Pages: 69-82

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 7
  • 313
  • Pages: 59-68