Publication schedule
-
№1 March 2026
Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Machine learning and knowledge control systems"
Automation of information security incident detection using custom correlation rules in a SIEM system
- Year: 2026
- Issue: 1
- 0
- 10
- Pages: 187-200
Identification of a person in uniform based on video stream data using the YOLO convolutional neural network
- Year: 2026
- Issue: 1
- 0
- 11
- Pages: 176-186
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 3
- 413
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 341
- Pages: 145-155
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
- Year: 2023
- Issue: 4
- 0
- 338
- Pages: 133-144
Creation and prospects of development of software for finding snow cover maxima from databases of meteorological archives
- Year: 2023
- Issue: 3
- 0
- 320
- Pages: 177-185
Development of a trainable neural network for analysis of linguistic data
- Year: 2023
- Issue: 3
- 0
- 338
- Pages: 170-176
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 361
- Pages: 154-169
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 333
- Pages: 155-166
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 1
- 344
- Pages: 191-201
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 365
- Pages: 148-159
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 371
- Pages: 135-147
INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE
- Year: 2022
- Issue: 2
- 0
- 375
- Pages: 125-134
Methodological and technological foundations for countering cognitive threats in generative multimodal content
- Year: 2025
- Issue: 4
- 23
- 593
- Pages: 138-162
A protection method for the global model of the federated learning systems based on a trust model
- Year: 2024
- Issue: 4
- 4
- 509
- Pages: 94-108
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 1
- 502
- Pages: 178-193
Detection of artificially synthesized audio files using graph neural networks
- Year: 2024
- Issue: 2
- 2
- 521
- Pages: 169-177
Automatic synthesis of 3D gas turbine blades shapes using machine learning
- Year: 2024
- Issue: 2
- 3
- 526
- Pages: 152-168
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 617
- Pages: 153-167
Protection of the machine learning models from the training data membership inference
- Year: 2024
- Issue: 1
- 2
- 588
- Pages: 142-152
Protection against adversarial attacks on image recognition systems using an autoencoder
- Year: 2023
- Issue: 1
- 3
- 586
- Pages: 119-127
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 580
- Pages: 104-110
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 709
- Pages: 112-120
Query processing in Data Lake Management System based on a universal data model
- Year: 2025
- Issue: 2
- 0
- 641
- Pages: 96-111
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 24
- 797
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 23
- 822
- Pages: 110-120
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 10
- 731
- Pages: 59-68
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 784
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 5
- 732
- Pages: 21-29