Search by keyword: "machine learning"
Method of protecting server infrastructure from distributed denial of service attack using a recurrent neural network
Authors: Semina A.A. | Published: 04.07.2025 |
Published in issue: #5(100)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: DDoS attacks, cybersecurity, recurrent neural networks, machine learning, server protection, NSL-KDD, automatic attack detection |
Machine learning and computer vision application in automated monitoring of the bee colonies in agriculture
Authors: Kochetkova A.A., Kochetkov A.A., Pushkin An.N., Pushkin Al.N. | Published: 03.07.2025 |
Published in issue: #3(98)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
Keywords: machine learning, computer vision systems, YOLO, ultralytics, beekeeping, bee colony population management, innovative technologies in agriculture, Fourth Industrial Revolution |
Characteristics of the Linux malware: conclusions and recent trends
Authors: Tonoyan A.K., Glinskaya E.V. | Published: 29.04.2025 |
Published in issue: #2(97)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: malware, forensics, Internet of Things, embedded systems, data analytics, machine learning, expert systems |
Classification of leasing documentation using the machine learning methods
Authors: Nasibullin D.I. | Published: 16.04.2025 |
Published in issue: #2(97)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
Keywords: machine learning, text documentation classification, error matrix, document flow automation, leasing documentation, tree decision making method, nearest neighbor method, support vector method, Bayesian classifier |
Security and threats overview in the machine learning
Authors: Losev N.S., Glinskaya E.V. | Published: 14.02.2025 |
Published in issue: #1(96)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: machine learning, countermeasure strategies, intruder attack data protection, protection methods, attack models, vulnerabilities, critical infrastructure |
Development of a platform for creating neural networks in the JAVA programming language
Authors: Bliznichenko A.Yu. | Published: 14.02.2025 |
Published in issue: #1(96)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
Keywords: neural network, editor platform, hyper-parameters, neural network architecture, user interface, data classification, machine learning |
Bayesian neural networks in the multi-agent environment
Authors: Podmaryov M.S. | Published: 25.07.2024 |
Published in issue: #3(92)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
Keywords: multi-agent environment, machine learning, multi-agent reward learning, neural networks, Bayesian neural networks, Bayesian Actor-Critic algorithm |
Artificial intelligence algorithms in improving communication between the pilot and the air traffic controller
Authors: Knyazeva A.A. | Published: 02.05.2024 |
Published in issue: #2(91)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
Keywords: сommunication, aviation, air traffic controller, radio communication, artificial intelligence, machine learning, natural language processing, speech recognition |
Development and problems in using artificial intelligence in the information security
Authors: Volodin A.A., Glinskaya E.V. | Published: 01.05.2024 |
Published in issue: #2(91)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: artificial intelligence, machine learning, information security, classified information protection, audit, monitoring, risk management, vulnerability identification, threat prevention |
Intelligent decision-making systems as the conflict resolution tool: review of modern approaches and practices
Authors: Yadykin N.V. | Published: 26.02.2024 |
Published in issue: #1(90)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
Keywords: intelligent systems, conflict management, technology, forecasting, data analysis, machine learning, simulation, decision-making efficiency |