Latest issues
- 2026, Issue 1
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
Articles from section "Machine learning and knowledge control systems"
Automation of information security incident detection using custom correlation rules in a SIEM system
- Year: 2026
- Issue: 1
- 7
- 315
- Pages: 187-200
Identification of a person in uniform based on video stream data using the YOLO convolutional neural network
- Year: 2026
- Issue: 1
- 5
- 267
- Pages: 176-186
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 6
- 637
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 3
- 543
- Pages: 145-155
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
- Year: 2023
- Issue: 4
- 0
- 517
- Pages: 133-144
Creation and prospects of development of software for finding snow cover maxima from databases of meteorological archives
- Year: 2023
- Issue: 3
- 0
- 490
- Pages: 177-185
Development of a trainable neural network for analysis of linguistic data
- Year: 2023
- Issue: 3
- 0
- 512
- Pages: 170-176
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 549
- Pages: 154-169
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 501
- Pages: 155-166
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 1
- 514
- Pages: 191-201
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 532
- Pages: 148-159
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 538
- Pages: 135-147
INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE
- Year: 2022
- Issue: 2
- 0
- 534
- Pages: 125-134
Methodological and technological foundations for countering cognitive threats in generative multimodal content
- Year: 2025
- Issue: 4
- 33
- 878
- Pages: 138-162
A protection method for the global model of the federated learning systems based on a trust model
- Year: 2024
- Issue: 4
- 4
- 697
- Pages: 94-108
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 2
- 690
- Pages: 178-193
Detection of artificially synthesized audio files using graph neural networks
- Year: 2024
- Issue: 2
- 2
- 702
- Pages: 169-177
Automatic synthesis of 3D gas turbine blades shapes using machine learning
- Year: 2024
- Issue: 2
- 6
- 711
- Pages: 152-168
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 792
- Pages: 153-167
Protection of the machine learning models from the training data membership inference
- Year: 2024
- Issue: 1
- 2
- 758
- Pages: 142-152
Protection against adversarial attacks on image recognition systems using an autoencoder
- Year: 2023
- Issue: 1
- 3
- 749
- Pages: 119-127
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 753
- Pages: 104-110
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 912
- Pages: 112-120
Query processing in Data Lake Management System based on a universal data model
- Year: 2025
- Issue: 2
- 1
- 816
- Pages: 96-111
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 26
- 1008
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 25
- 1024
- Pages: 110-120
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 16
- 945
- Pages: 59-68
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 13
- 978
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 6
- 921
- Pages: 21-29