Articles by keywords "model"
Model for forming development program of organization’s information security system
- Year: 2021
- Issue: 2
- 2
- 101
- Pages: 109-117
Efficiency of computer network functioning in conditions of malicious information influences
- Year: 2021
- Issue: 1
- 0
- 91
- Pages: 96-101
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 82
- Pages: 91-100
Optimization of the performance of the search information system in the legislative documents database
- Year: 2024
- Issue: 4
- 0
- 108
- Pages: 152-161
A protection method for the global model of the federated learning systems based on a trust model
- Year: 2024
- Issue: 4
- 0
- 114
- Pages: 94-108
Key pre-distribution technique using Shamir’s secret sharing scheme
- Year: 2024
- Issue: 4
- 1
- 131
- Pages: 74-84
Software tool for managing the access control model for the corporate portal
- Year: 2024
- Issue: 4
- 0
- 108
- Pages: 63-73
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 0
- 134
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 0
- 118
- Pages: 109-126
Construction of deterministic and stochastic mathematical models of information system protection
- Year: 2024
- Issue: 3
- 3
- 140
- Pages: 30-39
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 117
- Pages: 130-137
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 218
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 4
- 234
- Pages: 20-30
Reconfiguration of the system development model information security management: interaction of base modules with the operator
- Year: 2024
- Issue: 2
- 2
- 224
- Pages: 9-19
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 219
- Pages: 153-167
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 224
- Pages: 134-141
Accounting for the impact of the human factor in cyber security models
- Year: 2023
- Issue: 2
- 1
- 221
- Pages: 27-36
Current trends in methods of operational automation of data processing
- Year: 2023
- Issue: 1
- 0
- 212
- Pages: 79-87
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 1
- 224
- Pages: 28-35
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 3
- 244
- Pages: 18-27
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 4
- 245
- Pages: 168-178
Hiding data in audio files using coverless steganography methods
- Year: 2025
- Issue: Спецвыпуск
- 12
- 277
- Pages: 145-155
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 3
- 287
- Pages: 58-68
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 249
- Pages: 34-47
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 254
- Pages: 35-40
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 272
- Pages: 132-144
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 11
- 347
- Pages: 110-120
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
- Year: 2025
- Issue: 3
- 5
- 305
- Pages: 81-90
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 11
- 328
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 31
- 415
- Pages: 9-19
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 6
- 326
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 2
- 315
- Pages: 21-29
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 6
- 318
- Pages: 9-20