Articles by keywords "threats"

Automation of information security incident detection using custom correlation rules in a SIEM system

Machine learning and knowledge control systems
  • Year: 2026
  • Issue: 1
  • 7
  • 321
  • Pages: 187-200

Analysis of cyber threat intelligence information exchange systems

Information security application
  • Year: 2023
  • Issue: 4
  • 1
  • 527
  • Pages: 19-30

Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach

Information security application
  • Year: 2023
  • Issue: 3
  • 3
  • 568
  • Pages: 9-24

Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities

Critical information infrastructure security
  • Year: 2023
  • Issue: 2
  • 2
  • 570
  • Pages: 92-106

Medical cyber-physical systems attack systematization

Cyber-physic systems security
  • Year: 2021
  • Issue: 3
  • 1
  • 613
  • Pages: 118-129

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 4
  • 33
  • 882
  • Pages: 138-162

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • Year: 2025
  • Issue: 4
  • 24
  • 635
  • Pages: 23-34

Assessment of the descriptive ability of modern data sources for analyzing cyber security threats

  • Year: 2024
  • Issue: Спецвыпуск
  • 0
  • 660
  • Pages: 129-145

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 25
  • 846
  • Pages: 138-151

Development of attack scenarios for assessing threats related to information security breach in industrial networks

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2024
  • Issue: 1
  • 20
  • 878
  • Pages: 96-109

The specifics of solving the problem of information security risk management when developing methods of protection against hidden steganographic information exchange on public Internet resources

Information security application
  • Year: 2024
  • Issue: 1
  • 0
  • 813
  • Pages: 80-95

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 26
  • 1014
  • Pages: 147-164