Articles by keywords "machine learning"
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 6
- 643
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 3
- 549
- Pages: 145-155
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 506
- Pages: 155-166
Improving the quality of information security state identification based on sample segmentation
- Year: 2023
- Issue: 3
- 0
- 553
- Pages: 25-32
Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things
- Year: 2023
- Issue: 2
- 0
- 525
- Pages: 140-149
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 538
- Pages: 148-159
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 543
- Pages: 135-147
INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE
- Year: 2022
- Issue: 2
- 0
- 539
- Pages: 125-134
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 700
- Pages: 27-33
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 4
- 661
- Pages: 118-126
Development of phishing site classificators based on dynamicaly updated dataset
- Year: 2021
- Issue: 2
- 1
- 668
- Pages: 74-81
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 747
- Pages: 21-40
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
- Year: 2021
- Issue: 1
- 2
- 767
- Pages: 50-54
Analysis of ultra-high volumes of network traffic based on quantum machine learning
- Year: 2021
- Issue: 1
- 0
- 698
- Pages: 39-49
Using adversarial attacks to protect against automatic text recognition in CAPTCHA services
- Year: 2024
- Issue: Спецвыпуск
- 2
- 703
- Pages: 165-175
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 683
- Pages: 109-126
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 2
- 695
- Pages: 178-193
Automatic synthesis of 3D gas turbine blades shapes using machine learning
- Year: 2024
- Issue: 2
- 6
- 716
- Pages: 152-168
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
- Year: 2022
- Issue: 1
- 4
- 772
- Pages: 96-109
Countering steganalysis based on generative adversarial networks
- Year: 2024
- Issue: 2
- 1
- 800
- Pages: 57-65
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 812
- Pages: 31-43
Protection of the machine learning models from the training data membership inference
- Year: 2024
- Issue: 1
- 2
- 763
- Pages: 142-152
Aspects of detecting malicious installation files using machine learning algorithms
- Year: 2023
- Issue: 2
- 0
- 775
- Pages: 37-46
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 757
- Pages: 104-110
The use of convolutional neural networks to enhance the security of steganographic methods
- Year: 2025
- Issue: Спецвыпуск
- 2
- 891
- Pages: 134-144
Detection of fake news spread using machine learning
- Year: 2025
- Issue: Спецвыпуск
- 14
- 907
- Pages: 82-98
The structural model of Portable Executable files containing malicious code
- Year: 2025
- Issue: 2
- 12
- 1021
- Pages: 41-59
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 10
- 915
- Pages: 83-96
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 26
- 1015
- Pages: 147-164
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 16
- 950
- Pages: 59-68