Publication schedule
  • №1 March 2026

Articles by keywords "machine learning"

Adversarial attacks against a machine learning based intrusion detection system

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 3
  • 416
  • Pages: 156-190

Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 4
  • 0
  • 345
  • Pages: 145-155

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 3
  • 385
  • Pages: 72-83

STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 336
  • Pages: 155-166

VOICE IDENTIFICATION METHOD BASED ON MACHINE LEARNING

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 341
  • Pages: 143-154

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 2
  • 364
  • Pages: 33-57

Improving the quality of information security state identification based on sample segmentation

Information security application
  • Year: 2023
  • Issue: 3
  • 0
  • 369
  • Pages: 25-32

Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 2
  • 1
  • 364
  • Pages: 202-211

Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things

Cyber-physic systems security
  • Year: 2023
  • Issue: 2
  • 0
  • 354
  • Pages: 140-149

PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 1
  • 367
  • Pages: 148-159

COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 373
  • Pages: 135-147

INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 2
  • 0
  • 377
  • Pages: 125-134

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 454
  • Pages: 27-33

Encrypted files detection algorithm

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 484
  • Pages: 16-26

Security issues in federated learning systems

Applied cryptography
  • Year: 2025
  • Issue: 4
  • 10
  • 424
  • Pages: 76-88

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 3
  • 469
  • Pages: 118-126

Development of phishing site classificators based on dynamicaly updated dataset

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 462
  • Pages: 74-81

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 2
  • 535
  • Pages: 21-40

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 1
  • 552
  • Pages: 50-54

Analysis of ultra-high volumes of network traffic based on quantum machine learning

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 498
  • Pages: 39-49

Dynamic phishing website dataset collection

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 515
  • Pages: 31-38

Using adversarial attacks to protect against automatic text recognition in CAPTCHA services

  • Year: 2024
  • Issue: Спецвыпуск
  • 1
  • 510
  • Pages: 165-175

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 2
  • 494
  • Pages: 109-126

Authorship identification and verification using machine and deep learning methods

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 1
  • 504
  • Pages: 178-193

Automatic synthesis of 3D gas turbine blades shapes using machine learning

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 3
  • 529
  • Pages: 152-168

SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS

Cyber-physic systems security
  • Year: 2022
  • Issue: 1
  • 4
  • 595
  • Pages: 96-109

Countering steganalysis based on generative adversarial networks

Information security application
  • Year: 2024
  • Issue: 2
  • 1
  • 610
  • Pages: 57-65

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 614
  • Pages: 31-43

Protection of the machine learning models from the training data membership inference

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 1
  • 2
  • 590
  • Pages: 142-152

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 581
  • Pages: 37-46

DDoS attacks detection based on a modular neural network

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 583
  • Pages: 111-118

The hybrid method for evasion attacks detection in the machine learning systems

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 582
  • Pages: 104-110

The use of convolutional neural networks to enhance the security of steganographic methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 2
  • 691
  • Pages: 134-144

Detection of fake news spread using machine learning

  • Year: 2025
  • Issue: Спецвыпуск
  • 13
  • 697
  • Pages: 82-98

The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2025
  • Issue: 2
  • 5
  • 659
  • Pages: 131-142

The structural model of Portable Executable files containing malicious code

Information security application
  • Year: 2025
  • Issue: 2
  • 7
  • 734
  • Pages: 41-59

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 7
  • 716
  • Pages: 83-96

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 24
  • 800
  • Pages: 147-164

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 10
  • 733
  • Pages: 59-68