TY JOUR TI PROCESSING OF SIMULATION RESULTS OF COMPUTER ATTACKS ON THE OBJECT OF PROTECTION USING MACHINE LEARNING METHODS KW computer attacks KW machine learning KW performance characteristics KW state tree JO Intellectual Sovereignty AU Dobryshin, M.M. AU Zhilyaeva, V.A. PY 2026 IS 1 PB Autonomous Non-Commercial Organization Research Institute "Digital Philosophy - Digital Intelligence"