Neurosymbolic approach for attack detection in satellite communication systems
Abstract: In the context of increasing cyber threats, the pressing task becomes the implementation of new protection systems for satellite communications. The proposed article presents an innovative neurosymbolic method for attack detection that integrates the capabilities of artificial intelligence...
Saved in:
| Date: | 2024 |
|---|---|
| Main Author: | Mostovyi, O.S. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2024
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/640 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Multilayer perceptron as the primary instrument for image clustering
by: Gorokhovatskiy, O. V., et al.
Published: (2016)
by: Gorokhovatskiy, O. V., et al.
Published: (2016)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Application of a wavelet neural network approach to detect stator winding short circuits in asynchronous machines
by: Sakhara, S., et al.
Published: (2023)
by: Sakhara, S., et al.
Published: (2023)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Yield prediction at field level
by: Kryvoshein, Oleksandr, et al.
Published: (2024)
by: Kryvoshein, Oleksandr, et al.
Published: (2024)
Applying the predicate logic for cyber security artifacts verification in design of the critical purpose systems
by: Давидюк, А. В., et al.
Published: (2021)
by: Давидюк, А. В., et al.
Published: (2021)
Adaptive methods of detecting environmental changes using multispectral satellite images on the Earth for example territory Solotvyno
by: Yakimchuk, Vladyslav, et al.
Published: (2021)
by: Yakimchuk, Vladyslav, et al.
Published: (2021)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Maximizing solar photovoltaic system efficiency by multivariate linear regression based maximum power point tracking using machine learning
by: Paquianadin, V., et al.
Published: (2024)
by: Paquianadin, V., et al.
Published: (2024)
The technology of machine learning for a composite web service development
by: Grishanova, I.Yu., et al.
Published: (2025)
by: Grishanova, I.Yu., et al.
Published: (2025)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
System of automated software control of the antenna system of the satellite
by: Yehorov, Volodymyr O.
Published: (2024)
by: Yehorov, Volodymyr O.
Published: (2024)
Information technology of IT-infrastructure management architecture elements
by: Dovgiy, Stanislav O., et al.
Published: (2022)
by: Dovgiy, Stanislav O., et al.
Published: (2022)
STATE OF HEALTH (SOH) ESTIMATION FOR EMBEDDED BATTERY MANAGEMENT SYSTEMS: A COMPARATIVE ANALYSIS OF COMPUTATIONALLY EFFICIENT METHODS
by: Sorochynskyi , Ya., et al.
Published: (2026)
by: Sorochynskyi , Ya., et al.
Published: (2026)
Indirect adaptive fuzzy finite time synergetic control for power systems
by: Khatir, A., et al.
Published: (2023)
by: Khatir, A., et al.
Published: (2023)
COMPARATIVE ANALYSIS OF METHODS AND TOOLS FOR AMBIENT AIR QUALITY MONITORING
by: Kulykivskyi, Oleksandr, et al.
Published: (2025)
by: Kulykivskyi, Oleksandr, et al.
Published: (2025)
Malware dynamic analyses system based on virtual mashine introspection and mashine learning methods
by: Nafiev, A.E., et al.
Published: (2023)
by: Nafiev, A.E., et al.
Published: (2023)
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
An adaptive inference model in mobile systems
by: Haidukevych, Y.O., et al.
Published: (2026)
by: Haidukevych, Y.O., et al.
Published: (2026)
Mathematical model of the distribution of radio monitoring resources for observation of satellite communication channels using neural networks
by: Trysnyuk, Vasyl, et al.
Published: (2025)
by: Trysnyuk, Vasyl, et al.
Published: (2025)
Adaptive ensemble decision integration for indicator of resource security: methodology and statistical validation of stability
by: Ilyina, O.P., et al.
Published: (2026)
by: Ilyina, O.P., et al.
Published: (2026)
Characteristics for choice of models in the ansables classification
by: Barmak, O.V., et al.
Published: (2018)
by: Barmak, O.V., et al.
Published: (2018)
PHOTOVOLTAIC GENERATION FORECASTING MODELS: CONCEPTUAL ENSEMBLE ARCHITECTURES
by: Matushkin, Dmytro
Published: (2024)
by: Matushkin, Dmytro
Published: (2024)
Estimation and forecast of changes in the hydrochemical status of the Tisza river
by: Vasilenko, L.O., et al.
Published: (2018)
by: Vasilenko, L.O., et al.
Published: (2018)
Methods for implementing quadrotors autonomy based on hybrid learning methods
by: Ramyk, I.P., et al.
Published: (2026)
by: Ramyk, I.P., et al.
Published: (2026)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Implementation of neural network based 2D seismic images super resolution approach
by: Noskov, Oleksii, et al.
Published: (2025)
by: Noskov, Oleksii, et al.
Published: (2025)
METHOD AND FIRST RESULTS OF CALCULATION OF SLANT-RANGE DIFFERENCES TO ACTIVE GEOSTATIONARY TELECOMMUNICATION SATELLITE
by: Bushuev, F. I., et al.
Published: (2015)
by: Bushuev, F. I., et al.
Published: (2015)
Information technologies of application architecture`s IT services
by: Dovgiy, Stanislav O., et al.
Published: (2023)
by: Dovgiy, Stanislav O., et al.
Published: (2023)
Synthesis of information and telecommunication networks of automatized environmental security systems with the purpose of gaining maximum noise resistance with a given efficiency
by: Dovgiy, Stanislav O., et al.
Published: (2021)
by: Dovgiy, Stanislav O., et al.
Published: (2021)
Digital twins in intrusion detection systems based on deep learning
by: Letychevskyi, O.O., et al.
Published: (2025)
by: Letychevskyi, O.O., et al.
Published: (2025)
SEASONAL STORAGE OF ENERGY IN A HYBRID ENERGY SYSTEM
by: Kuznietsov , M., et al.
Published: (2024)
by: Kuznietsov , M., et al.
Published: (2024)
Neurosymbolic Approach in Biological Research
by: Yu. H. Tarasich, et al.
Published: (2023)
by: Yu. H. Tarasich, et al.
Published: (2023)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Intelligent cascaded adaptive neuro fuzzy interface system controller fed KY converter for hybrid energy based microgrid applications
by: Sathish, Ch., et al.
Published: (2023)
by: Sathish, Ch., et al.
Published: (2023)
Spectral function of graphene with short-range impurity centers
by: Skrypnyk, Yu.V., et al.
Published: (2008)
by: Skrypnyk, Yu.V., et al.
Published: (2008)
Toward theory of quantum Hall effect in graphene
by: Gorbar, E.V., et al.
Published: (2008)
by: Gorbar, E.V., et al.
Published: (2008)
Effect of next-to-nearest neighbor hopping on electronic properties of graphene
by: Suprunenko, Y.F., et al.
Published: (2008)
by: Suprunenko, Y.F., et al.
Published: (2008)
Similar Items
-
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025) -
Multilayer perceptron as the primary instrument for image clustering
by: Gorokhovatskiy, O. V., et al.
Published: (2016) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023) -
Application of a wavelet neural network approach to detect stator winding short circuits in asynchronous machines
by: Sakhara, S., et al.
Published: (2023) -
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)