Articles by keywords "neural network"

Adversarial attacks on intrusion detection systems using LSTM classifier

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 0
  • 92
  • Pages: 48-56

Anomaly detection in cyber-physical systems using graph neural networks

Network and telecommunication security
  • Year: 2021
  • Issue: 2
  • 1
  • 102
  • Pages: 21-40

Anomaly detection in cyber-physical systems using graph neural networks

Information security cyber-physic systems
  • Year: 2021
  • Issue: 1
  • 0
  • 109
  • Pages: 117-130

Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms

Network and telecommunication security
  • Year: 2021
  • Issue: 1
  • 0
  • 105
  • Pages: 50-54

Banking fraud detection using graph neural networks

Cyber-physic systems security
  • Year: 2021
  • Issue: 4
  • 1
  • 104
  • Pages: 112-122

Method for searching for clones of program code in binary executable files

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 113
  • Pages: 46-55

Detection of artificially synthesized audio files using graph neural networks

Machine learning and knowledge control systems
  • Year: 2024
  • Issue: 2
  • 0
  • 135
  • Pages: 169-177

Application of machine learning methods in the problem of searching area of interest for biometric identification based on the pattern of palm veins

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 0
  • 217
  • Pages: 128-138

DDOS ATTACKS DETECTION BASED ON A MODULAR NEURAL NETWORK

Machine learning and knowledge control systems
  • Year: 2023
  • Issue: 1
  • 2
  • 226
  • Pages: 111-118

The use of convolutional neural networks to enhance the security of steganographic methods

  • Year: 2025
  • Issue: Спецвыпуск
  • 1
  • 261
  • Pages: 134-144

The application of machine learning algorithms in securing IoT-systems network infrastructure in water transport systems

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2025
  • Issue: 2
  • 4
  • 266
  • Pages: 131-142

Analysis of the possibilities of using biometric characteristics to identify a potential internal violator based on his psycho-emotional state

Information security application
  • Year: 2025
  • Issue: 2
  • 6
  • 286
  • Pages: 9-20

Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task

Network and telecommunication security
  • Year: 2025
  • Issue: 3
  • 3
  • 338
  • Pages: 55-68

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 2
  • 325
  • Pages: 21-29