Articles by keywords "detection"

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 7
  • 322
  • Pages: 187-200

Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management

Cyber-physic systems security
  • Year: 2026
  • Issue: 1
  • 11
  • 297
  • Pages: 152-167

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 6
  • 272
  • Pages: 58-68

Adversarial attacks against a machine learning based intrusion detection system

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 6
  • 643
  • Pages: 156-190

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 3
  • 549
  • Pages: 145-155

Attack detection by artificial neural networks

Network and telecommunication security
  • Year: 2023
  • Issue: 4
  • 1
  • 567
  • Pages: 84-94

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 3
  • 588
  • Pages: 72-83

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 525
  • Pages: 70-81

CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM

Information security application
  • Year: 2022
  • Issue: 4
  • 1
  • 491
  • Pages: 35-42

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 2
  • 1
  • 538
  • Pages: 202-211

COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 543
  • Pages: 135-147

Segmenting data samples for Internet of Things devices security state analysis

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 583
  • Pages: 130-136

An approach to detecting botnet attacks in the Internet of Things networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 0
  • 595
  • Pages: 108-117

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 700
  • Pages: 27-33

ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

Critical information infrastructure security
  • Year: 2022
  • Issue: 2
  • 1
  • 524
  • Pages: 51-64

Software for detecting potentially dangerous items at mass event entries using computer vision

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2025
  • Issue: 4
  • 10
  • 596
  • Pages: 110-120

IoT devices analysis using neural networks ensemble trained on unbalanced sample

Information security cyber-physic systems
  • Year: 2021
  • Issue: 2
  • 3
  • 696
  • Pages: 127-134

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 668
  • Pages: 74-81

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 748
  • Pages: 48-56

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 747
  • Pages: 21-40

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 898
  • Pages: 117-130

Detection of network attacks in software-defined networks using isolating forest algorithm

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 2
  • 748
  • Pages: 62-78

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 2
  • 767
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 698
  • Pages: 39-49

Dynamic phishing website dataset collection

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 713
  • Pages: 31-38

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 3
  • 761
  • Pages: 112-122

Predicting network attacks on IoT systems using regression analysis

Network and telecommunication security
  • Year: 2021
  • Issue: 4
  • 2
  • 694
  • Pages: 39-50

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 3
  • 717
  • Pages: 9-25

Methodology for finding errors and nondeclared features in software

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 669
  • Pages: 157-164

Vulnerability detection in multicomponent software using a set of generalized code graph representations

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 666
  • Pages: 65-75

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 2
  • 722
  • Pages: 130-137

METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES

Applied cryptography
  • Year: 2022
  • Issue: 1
  • 1
  • 755
  • Pages: 68-76

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 749
  • Pages: 134-141

METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS

Network and telecommunication security
  • Year: 2022
  • Issue: 1
  • 3
  • 848
  • Pages: 51-57

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 757
  • Pages: 104-110

A method for detecting manipulation attacks on recommendation systems with collaborative filtering

Information security application
  • Year: 2023
  • Issue: 1
  • 3
  • 742
  • Pages: 37-45

Steganalytical modulе for insert detection in low stego-payload images

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 803
  • Pages: 9-17

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 844
  • Pages: 124-133

Detection of fake news spread using machine learning

  • Year: 2025
  • Issue: Спецвыпуск
  • 14
  • 907
  • Pages: 82-98

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • Year: 2025
  • Issue: Спецвыпуск
  • 7
  • 853
  • Pages: 69-81

Application of genetic algorithm for selection of neyral network hyperparameters

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 919
  • Pages: 112-120

Identification of honeypot-systems on the basis of complex analysis of node performance indicators

Network and telecommunication security
  • Year: 2025
  • Issue: 2
  • 5
  • 814
  • Pages: 86-95

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 12
  • 1021
  • Pages: 41-59

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 1
  • 851
  • Pages: 132-144

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 24
  • 964
  • Pages: 20-29

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 917
  • Pages: 69-82

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 16
  • 950
  • Pages: 59-68