Digital twins in intrusion detection systems based on deep learning
This work aims to improve the accuracy of attack detection in software and hardware systems by utilizing a digital twin in the form of an algebraic model within intrusion detection systems (IDSs) based on deep learning neural networks (DNNs). This approach addresses the shortcomings of training and...
Saved in:
| Date: | 2025 |
|---|---|
| Main Authors: | Letychevskyi, O.O., Yevdokymov, S.O. |
| Format: | Article |
| Language: | English |
| Published: |
PROBLEMS IN PROGRAMMING
2025
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/834 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025)
by: Yevdokymov, S.O.
Published: (2025)
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025)
by: Alishоv, N.I., et al.
Published: (2025)
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025)
by: Koltyk, M.A.
Published: (2025)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Characteristics of information flows of software modules included in the software for automated support of ...
by: Borovskaya, E.N., et al.
Published: (2025)
by: Borovskaya, E.N., et al.
Published: (2025)
Application of deep learning technology for creating intellectual autonomous machines
by: Bilokon, O.S.
Published: (2020)
by: Bilokon, O.S.
Published: (2020)
Twin signed domination numbers in directed graphs
by: Atapour, Maryam, et al.
Published: (2017)
by: Atapour, Maryam, et al.
Published: (2017)
APPLICATION OF DEEP LEARNING NEURAL NETWORK FOR CLASSIFICATION OF BIG DATA OF ASTRONOMIC OBSERVATIONS
by: Gorbunov, A. A., et al.
Published: (2017)
by: Gorbunov, A. A., et al.
Published: (2017)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Developing a conceptual framework for resilience in information systems
by: Korobeynikov, F.O.
Published: (2024)
by: Korobeynikov, F.O.
Published: (2024)
Neuro-symbolic approach for the biological systems and processes research
by: Letychevskyi, O.O., et al.
Published: (2024)
by: Letychevskyi, O.O., et al.
Published: (2024)
Algebraic approach to the analysis of legal documents
by: Letychevskyi, O.O., et al.
Published: (2023)
by: Letychevskyi, O.O., et al.
Published: (2023)
Application of deep learning and computer vision frameworks for solving video context prediction problem
by: Voloshyn, D.
Published: (2018)
by: Voloshyn, D.
Published: (2018)
Automatic development of deep neural networks for improving numerical meteorological forecast
by: Doroshenko, А.Yu., et al.
Published: (2024)
by: Doroshenko, А.Yu., et al.
Published: (2024)
The problem of prediction of the transmission coefficient using neural networks with a limited quantity of data
by: Krysenko, Pavlo
Published: (2025)
by: Krysenko, Pavlo
Published: (2025)
Algebraic modeling in international and local service logistical systems
by: Letychevskyi, O.O., et al.
Published: (2021)
by: Letychevskyi, O.O., et al.
Published: (2021)
Practical content of the elements of petrophysical model of terrigenous sandstones — oil and gas reservoirs in neural networks, deep learning and regression methods
by: Vyzhva, Serhiy, et al.
Published: (2025)
by: Vyzhva, Serhiy, et al.
Published: (2025)
Creating a digital twin in meteorological forecasting for a smart city on a mobile platform
by: Haidukevych, V.O., et al.
Published: (2023)
by: Haidukevych, V.O., et al.
Published: (2023)
DESIGN OF A MATLAB GUI FOR SHORT-TERM SOLAR FORECASTING BASED ON DEEP LEARNING
by: Matushkin, D., et al.
Published: (2023)
by: Matushkin, D., et al.
Published: (2023)
Application of deep reinforced learning for long-term dynamic composition of WEB services
by: Moroz, H.B.
Published: (2025)
by: Moroz, H.B.
Published: (2025)
Machine learning methods analysis in the document classification problem
by: Zhyrkova, A.P., et al.
Published: (2021)
by: Zhyrkova, A.P., et al.
Published: (2021)
Recurrent neural networks for the problem of improving numerical meteorological forecasts
by: Doroshenko, А.Yu., et al.
Published: (2023)
by: Doroshenko, А.Yu., et al.
Published: (2023)
Use of methods of algebraic programming for the formal verification of legal acts
by: Peschanenko, V.S., et al.
Published: (2018)
by: Peschanenko, V.S., et al.
Published: (2018)
Development of the intelligent control system of an unmanned car
by: Dakhno, N.B., et al.
Published: (2024)
by: Dakhno, N.B., et al.
Published: (2024)
Extracting structure from text documents based on machine learning
by: Kudim, K.A., et al.
Published: (2023)
by: Kudim, K.A., et al.
Published: (2023)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Algebraic approach and artificial intelligence methods in modern intrusion detection systems
by: O. O. Letychevskyi, et al.
Published: (2023)
by: O. O. Letychevskyi, et al.
Published: (2023)
Application of machine learning in software engineering: an overview
by: Moroz, O.H., et al.
Published: (2019)
by: Moroz, O.H., et al.
Published: (2019)
Ontological modeling of adult learning ecosystem as a personalization tool
by: Rogushina, J.V., et al.
Published: (2026)
by: Rogushina, J.V., et al.
Published: (2026)
Machine-learning methods for text named entity recognition
by: Marchenko, O.O.
Published: (2018)
by: Marchenko, O.O.
Published: (2018)
Parallel software auto-tuning using statistical modeling and machine learning
by: Doroshenko, А.Yu., et al.
Published: (2018)
by: Doroshenko, А.Yu., et al.
Published: (2018)
ECONOMY DIGITALIZATION AS A DIGITAL TRANSFORMATION TOOL OF UKRAINE
by: Mosiichuk, Iryna, et al.
Published: (2020)
by: Mosiichuk, Iryna, et al.
Published: (2020)
Geographic information intelligent systems based on modern information technologies for digital terrain modelling
by: Vdovychenko, V.V., et al.
Published: (2025)
by: Vdovychenko, V.V., et al.
Published: (2025)
Methods for implementing quadrotors autonomy based on hybrid learning methods
by: Ramyk, I.P., et al.
Published: (2026)
by: Ramyk, I.P., et al.
Published: (2026)
Neural and Bayesian networks in the problem of credit risk analysis
by: Kuznietsova, N. V., et al.
Published: (2015)
by: Kuznietsova, N. V., et al.
Published: (2015)
Developing a semantic image model using machine learning based on convolutional neural networks
by: Andon, P.I., et al.
Published: (2020)
by: Andon, P.I., et al.
Published: (2020)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Applying modern construction 4.0 technology to damaged buildings
by: Kaliukh, Iurii, et al.
Published: (2025)
by: Kaliukh, Iurii, et al.
Published: (2025)
The effect of SiO2 microparticle concentration on the electrical and thermal properties of silicone rubber for electrical insulation applications
by: Ahmed, Z., et al.
Published: (2025)
by: Ahmed, Z., et al.
Published: (2025)
Similar Items
-
Neurosymbolic models for ensuring cybersecurity in critical cyberphysical systems
by: Yevdokymov, S.O.
Published: (2025) -
Technology system integration of hardware and software data protection
by: Alishоv, N.I., et al.
Published: (2025) -
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025) -
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)