Publication schedule
  • №1 March 2026
Sergey V. Bezzateev
Sergey V. Bezzateev
Affiliation
Saint Petersburg State University of Aerospace Instrumentation
Degree
Doctor of Technical Sciences
Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A
Publications

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 1
  • 13
  • 787
  • Pages: 43-58

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • Year: 2025
  • Issue: 3
  • 23
  • 825
  • Pages: 110-120

Protection of DevOps pipelines: automation of security within DevSecOps

Information security application
  • Year: 2025
  • Issue: 2
  • 10
  • 800
  • Pages: 21-34

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 2
  • 494
  • Pages: 109-126

Blockchain in 5G networks: perfomance comparison of private and public blockchain

Applied cryptography
  • Year: 2021
  • Issue: 3
  • 0
  • 421
  • Pages: 55-62

Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics

Information security application
  • Year: 2023
  • Issue: 3
  • 2
  • 364
  • Pages: 33-57

THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES

Research, monitoring and optimization of automated technological processes and productions control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 338
  • Pages: 96-120

STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS

Machine learning and knowledge control systems
  • Year: 2022
  • Issue: 3
  • 0
  • 336
  • Pages: 155-166

FINDING ENUMERATORS FOR A GENERALIZED (L, G)-CODE

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 320
  • Pages: 64-70

IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY

Applied cryptography
  • Year: 2022
  • Issue: 4
  • 0
  • 352
  • Pages: 71-88

Ranking model of the system of compromise indicators of nodes of a corporate data transmission network

Network and telecommunication security
  • Year: 2023
  • Issue: 3
  • 1
  • 351
  • Pages: 82-89

Oblivious signature scheme based on isogenies of supersingular elliptic curves

Applied cryptography
  • Year: 2023
  • Issue: 4
  • 5
  • 363
  • Pages: 116-121