Articles by keywords "model"
Quality improvement of information security events identification through input data splitting
- Year: 2024
- Issue: 2
- 0
- 32
- Pages: 31-43
Mathematical model of information security event management using Markov chain in industrial systems
- Year: 2024
- Issue: 2
- 0
- 29
- Pages: 20-30
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 30
- Pages: 153-167
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 0
- 32
- Pages: 134-141
ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS
- Year: 2023
- Issue: 2
- 0
- 30
- Pages: 27-36
CURRENT TRENDS IN METHODS OF OPERATIONAL AUTOMATION OF DATA PROCESSING
- Year: 2023
- Issue: 1
- 0
- 31
- Pages: 79-87
Presentation of graph-based model for use in automated security analysis systems
- Year: 2024
- Issue: 1
- 0
- 30
- Pages: 28-35
Assessment of the competence of the intelligent information security management system
- Year: 2024
- Issue: 1
- 0
- 32
- Pages: 18-27
Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment
- Year: 2025
- Issue: Спецвыпуск
- 3
- 46
- Pages: 168-178
Hiding data in audio files using coverless steganography methods
- Year: 2025
- Issue: Спецвыпуск
- 4
- 49
- Pages: 145-155
Application of large language models in event forecasting field
- Year: 2025
- Issue: Спецвыпуск
- 0
- 45
- Pages: 58-68
Countering illegitimate smart voice assistant triggering
- Year: 2025
- Issue: Спецвыпуск
- 0
- 40
- Pages: 34-47
The graph model of a defense system for detecting malicious activity in a functional network infrastructure
- Year: 2025
- Issue: 2
- 0
- 54
- Pages: 35-40
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
- Year: 2025
- Issue: 1
- 0
- 76
- Pages: 132-144
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 2
- 119
- Pages: 110-120
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
- Year: 2025
- Issue: 3
- 2
- 97
- Pages: 81-90
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 4
- 108
- Pages: 20-29
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 1
- 111
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 1
- 110
- Pages: 21-29
Optimization of indicator of compromise utilization in information security tasks
- Year: 2025
- Issue: 1
- 1
- 113
- Pages: 9-20