Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/123456789/32427Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lapin, V. G. | - |
| dc.contributor.author | Лапин, В. Г. | - |
| dc.contributor.author | Tokmakova, M. E. | - |
| dc.contributor.author | Токмакова, М. Е. | - |
| dc.contributor.author | Dmitrienko, A. V. | - |
| dc.contributor.author | Дмитриенко, А. В. | - |
| dc.date.accessioned | 2025-12-12T11:59:34Z | - |
| dc.date.available | 2025-12-12T11:59:34Z | - |
| dc.date.issued | 2026 | - |
| dc.identifier.citation | Lapin, V., Tokmakova, M., Dmitrienko, A., Sajid, M. Detecting Information Security Threats Using Machine Learning: A Survey of Algorithms and Application Problems // Lecture Notes in Networks and Systems. - 2026. - 1456 LNNS. - pp. 268 - 276. - DOI: 10.1007/978-3-032-07275-7_25 | ru |
| dc.identifier.uri | https://dspace.ncfu.ru/handle/123456789/32427 | - |
| dc.description.abstract | This article examines the applicability of machine learning in the context of information security. The main focus is on analyzing the effectiveness of various algorithms and models in strengthening the protection of information systems. This review covers the breadth of machine learning applications to information security problems, presents a wide variety of machine learning methods, and discusses examples of how each of them applies to security-related problems. The article provides examples of how machine learning is used to counter cyber threats, ensure the security of mobile and cloud environments, and automate the threat analysis process. The aim of the work is to systematize relevant research, methods and technologies of machine learning that contribute to improving the level of security and data security in an ever-changing threat landscape. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | ru |
| dc.relation.ispartofseries | Lecture Notes in Networks and Systems | - |
| dc.subject | Approaches to information security | ru |
| dc.subject | Classification | ru |
| dc.subject | Clustering | ru |
| dc.subject | Data protection | ru |
| dc.subject | Information security | ru |
| dc.subject | Information security | ru |
| dc.title | Detecting Information Security Threats Using Machine Learning: A Survey of Algorithms and Application Problems | ru |
| dc.type | Статья | ru |
| vkr.inst | Институт перспективной инженерии | ru |
| vkr.inst | Факультет математики и компьютерных наук имени профессора Н.И. Червякова | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 3823.pdf Restricted Access | 129.06 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.