AI (not) against AI
The aim of the research is to identify information, technological and methodological approaches to artificial intelligence developing in modern conditions of digital transformation, and in the long term. The objectives of the research are the following questions: a) to conduct a systematic analysis...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Nesterenko, Oleksandr, Yatsuk, Petro |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Kyiv National University of Construction and Architecture
2025
|
| Subjects: | |
| Online Access: | https://es-journal.in.ua/article/view/351692 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Environmental safety and natural resources |
Institution
Environmental safety and natural resourcesSimilar Items
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Modern AI methods for detecting propaganda in text
by: Бойко , О.А.
Published: (2025)
by: Бойко , О.А.
Published: (2025)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Review of AI-Driven Solutions in Business Value and Operational Efficiency
by: Tairov, Iskren, et al.
Published: (2024)
by: Tairov, Iskren, et al.
Published: (2024)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Когнітивна AI-платформа для автономної навігації розподілених багатоагентних систем
by: Zgurovsky, Michael, et al.
Published: (2025)
by: Zgurovsky, Michael, et al.
Published: (2025)
Problems of active protection of information from leakage through vibroacoustic channels
by: Kataiev, V. С., et al.
Published: (2016)
by: Kataiev, V. С., et al.
Published: (2016)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Особливості використання EXPLAINABLE AI у біомедичній обробці зображень: прозорість та інтерпретованість моделей
by: Пилипець, Ю.О., et al.
Published: (2026)
by: Пилипець, Ю.О., et al.
Published: (2026)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Digital Technology Management and Resource Efficiency in Agricultural Production
by: Ismailov, Taner, et al.
Published: (2025)
by: Ismailov, Taner, et al.
Published: (2025)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Агентний підхід до впровадження штучного інтелекту (AI) в межах сервіс-орієнтованої архітектури (SOA)
by: Petrenko, Anatolii
Published: (2025)
by: Petrenko, Anatolii
Published: (2025)
PROBLEMS IN TESTING DIGITAL PROTECTIVE RELAY FOR IMMUNITY TO INTENTIONAL DESTRUCTIVE ELECTROMAGNETIC IMPACTS. CONTINUATION OF THE THEME
by: Gurevich, Vladimir I.
Published: (2015)
by: Gurevich, Vladimir I.
Published: (2015)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
Increasing the resilience of the method of protection to ensure the authenticity of raster images of the evidence base from unauthorized access.
by: Pavlenko, B. V., et al.
Published: (2019)
by: Pavlenko, B. V., et al.
Published: (2019)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Digitalization of personnel management processes for the post-war recovery of Ukraine
by: Vasylenko, Vladyslav, et al.
Published: (2025)
by: Vasylenko, Vladyslav, et al.
Published: (2025)
Method of processing information about the state of the environment based on data obtained through a service-oriented network
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Інформаційні технології для підвищення ефективності енергосистем України
by: Krymska, Anna, et al.
Published: (2024)
by: Krymska, Anna, et al.
Published: (2024)
Mathematical modeling, intelligent data analysis and artificial intelligence to support decision-making in post-war reconstruction
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
Similar Items
-
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019) -
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020) -
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020) -
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)