Search by keyword: "machine learning"
Analysis of current research in the field of machine learning for process optimization in additive manufacturing
| Authors: Khokhlov A.V. | Published: 16.02.2026 |
| Published in issue: #1(102)/2026 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
| Keywords: additive manufacturing, machine learning, parameter optimization, photopolymerization in a bath, powder fusion, extrusion of materials, prediction of defects, product quality | |
Detection and prevention of botnets in cybersecurity
| Authors: Losev N.S., Glinskaya E.V. | Published: 17.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: botnet, botmaster, detection, attacker, machine learning, cybersecurity, DDoS attack, malware | |
An overview of defensive and offensive artificial intelligence in cybersecurity
| Authors: Amanatidi V.S., Glinskaya E.V. | Published: 17.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: artificial intelligence, machine learning, artificial intelligence-based cyber defense systems, competitive artificial intelligence, development methodology, reinforcement learning, vulnerabilities | |
Data augmentation method for training a classification model based on the imposition of random noise, taking into account the values of the target feature
| Authors: Artyukhin N.P. | Published: 28.08.2025 |
| Published in issue: #4(99)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
| Keywords: machine learning, classification model, training dataset augmentation, data transformation, random data generation, data mixing, structured data, tables, Gini index | |
Method of protecting server infrastructure from distributed denial of service attack using a recurrent neural network
| Authors: Semina A.A. | Published: 04.07.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: DDoS attacks, cybersecurity, recurrent neural networks, machine learning, server protection, NSL-KDD, automatic attack detection | |
Machine learning and computer vision application in automated monitoring of the bee colonies in agriculture
| Authors: Kochetkova A.A., Kochetkov A.A., Pushkin An.N., Pushkin Al.N. | Published: 03.07.2025 |
| Published in issue: #3(98)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
| Keywords: machine learning, computer vision systems, YOLO, ultralytics, beekeeping, bee colony population management, innovative technologies in agriculture, Fourth Industrial Revolution | |
Characteristics of the Linux malware: conclusions and recent trends
| Authors: Tonoyan A.K., Glinskaya E.V. | Published: 29.04.2025 |
| Published in issue: #2(97)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: malware, forensics, Internet of Things, embedded systems, data analytics, machine learning, expert systems | |
Classification of leasing documentation using the machine learning methods
| Authors: Nasibullin D.I. | Published: 16.04.2025 |
| Published in issue: #2(97)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
| Keywords: machine learning, text documentation classification, error matrix, document flow automation, leasing documentation, tree decision making method, nearest neighbor method, support vector method, Bayesian classifier | |
Security and threats overview in the machine learning
| Authors: Losev N.S., Glinskaya E.V. | Published: 14.02.2025 |
| Published in issue: #1(96)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: machine learning, countermeasure strategies, intruder attack data protection, protection methods, attack models, vulnerabilities, critical infrastructure | |
Development of a platform for creating neural networks in the JAVA programming language
| Authors: Bliznichenko A.Yu. | Published: 14.02.2025 |
| Published in issue: #1(96)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Information Technology. Computer techologies. Theory of computers and systems | |
| Keywords: neural network, editor platform, hyper-parameters, neural network architecture, user interface, data classification, machine learning | |
