Articles by keywords "model"

Model for forming development program of organization’s information security system

Special IT
  • Year: 2021
  • Issue: 2
  • 2
  • 101
  • Pages: 109-117

Efficiency of computer network functioning in conditions of malicious information influences

Special IT
  • Year: 2021
  • Issue: 1
  • 0
  • 91
  • Pages: 96-101

Use of agile management tools in projects of information security systems implementation

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2021
  • Issue: 4
  • 0
  • 80
  • Pages: 123-136

Development of a mechanism to control message integrity on the local network of vehicles

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 0
  • 82
  • Pages: 91-100

Optimization of the performance of the search information system in the legislative documents database

Quality assessment and software systems support
  • Year: 2024
  • Issue: 4
  • 0
  • 108
  • Pages: 152-161

A protection method for the global model of the federated learning systems based on a trust model

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 4
  • 0
  • 114
  • Pages: 94-108

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • Year: 2024
  • Issue: 4
  • 1
  • 131
  • Pages: 74-84

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • Year: 2024
  • Issue: 4
  • 0
  • 108
  • Pages: 63-73

Approach to creating personalised LLM agents based on MBTI personality traits

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 134
  • Pages: 127-141

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 118
  • Pages: 109-126

Construction of deterministic and stochastic mathematical models of information system protection

Information security aspects
  • Year: 2024
  • Issue: 3
  • 3
  • 140
  • Pages: 30-39

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 0
  • 117
  • Pages: 130-137

PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 1
  • 192
  • Pages: 121-131

METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 0
  • 195
  • Pages: 110-120

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 2
  • 0
  • 218
  • Pages: 66-72

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 218
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 4
  • 234
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 2
  • 224
  • Pages: 9-19

Intelligent mechanisms for extracting features of file modification in dynamic virus analysis

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 1
  • 0
  • 219
  • Pages: 153-167

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 224
  • Pages: 134-141

Accounting for the impact of the human factor in cyber security models

Information security application
  • Year: 2023
  • Issue: 2
  • 1
  • 221
  • Pages: 27-36

Current trends in methods of operational automation of data processing

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 1
  • 0
  • 212
  • Pages: 79-87

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 1
  • 224
  • Pages: 28-35

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 3
  • 244
  • Pages: 18-27

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 245
  • Pages: 168-178

Hiding data in audio files using coverless steganography methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 12
  • 277
  • Pages: 145-155

Application of large language models in event forecasting field

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 287
  • Pages: 58-68

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 249
  • Pages: 34-47

Combination of methods of selective teacher intervention in the student’s learning process and low-rank adaptation in the knowledge distillation model

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 273
  • Pages: 121-130

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 254
  • Pages: 35-40

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 272
  • Pages: 132-144

Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 5
  • 326
  • Pages: 121-146

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 11
  • 347
  • Pages: 110-120

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 6
  • 305
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 5
  • 305
  • Pages: 81-90

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 11
  • 328
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 31
  • 415
  • Pages: 9-19

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 6
  • 326
  • Pages: 43-58

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 2
  • 315
  • Pages: 21-29

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 6
  • 318
  • Pages: 9-20