Articles by keywords "model"

PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 0
  • 4
  • Pages: 121-131

METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2022
  • Issue: 1
  • 0
  • 5
  • Pages: 110-120

Automation of ship repair management

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 2
  • 0
  • 23
  • Pages: 66-72

Quality improvement of information security events identification through input data splitting

Information security application
  • Year: 2024
  • Issue: 2
  • 0
  • 32
  • Pages: 31-43

Mathematical model of information security event management using Markov chain in industrial systems

Information security aspects
  • Year: 2024
  • Issue: 2
  • 0
  • 29
  • Pages: 20-30

Reconfiguration of the system development model information security management: interaction of base modules with the operator

Information security aspects
  • Year: 2024
  • Issue: 2
  • 0
  • 30
  • Pages: 9-19

Intelligent mechanisms for extracting features of file modification in dynamic virus analysis

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 1
  • 0
  • 30
  • Pages: 153-167

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 0
  • 32
  • Pages: 134-141

ACCOUNTING FOR THE IMPACT OF THE HUMAN FACTOR IN CYBER SECURITY MODELS

Information security application
  • Year: 2023
  • Issue: 2
  • 0
  • 30
  • Pages: 27-36

CURRENT TRENDS IN METHODS OF OPERATIONAL AUTOMATION OF DATA PROCESSING

Technological systems, algorithmization of tasks and control objects modeling
  • Year: 2023
  • Issue: 1
  • 0
  • 31
  • Pages: 79-87

Presentation of graph-based model for use in automated security analysis systems

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 30
  • Pages: 28-35

Assessment of the competence of the intelligent information security management system

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 32
  • Pages: 18-27

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • Year: 2025
  • Issue: Спецвыпуск
  • 3
  • 46
  • Pages: 168-178

Hiding data in audio files using coverless steganography methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 4
  • 49
  • Pages: 145-155

Application of large language models in event forecasting field

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 45
  • Pages: 58-68

Countering illegitimate smart voice assistant triggering

  • Year: 2025
  • Issue: Спецвыпуск
  • 0
  • 40
  • Pages: 34-47

Combination of methods of selective teacher intervention in the student’s learning process and low-rank adaptation in the knowledge distillation model

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 2
  • 0
  • 57
  • Pages: 121-130

The graph model of a defense system for detecting malicious activity in a functional network infrastructure

Information security application
  • Year: 2025
  • Issue: 2
  • 0
  • 54
  • Pages: 35-40

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • Year: 2025
  • Issue: 1
  • 0
  • 76
  • Pages: 132-144

Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 1
  • 105
  • Pages: 121-146

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 2
  • 119
  • Pages: 110-120

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 2
  • 98
  • Pages: 91-99

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • Year: 2025
  • Issue: 3
  • 2
  • 97
  • Pages: 81-90

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 4
  • 108
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 9
  • 147
  • Pages: 9-19

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 1
  • 111
  • Pages: 43-58

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 1
  • 110
  • Pages: 21-29

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • Year: 2025
  • Issue: 1
  • 1
  • 113
  • Pages: 9-20