Publication schedule
-
№1 March 2026
Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Evgeny Yu. Pavlenko
Affiliation
Peter the Great St. Petersburg Polytechnic University
Degree
Doctor of Technical Sciences
Publications
Orcid ID
0000-0003-1345-1874
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 21
- 857
- Pages: 30-39
Automated security analysis of software for the Android operating system
- Year: 2025
- Issue: Спецвыпуск
- 4
- 609
- Pages: 112-123
Graph self-regulation of various types of networks with adaptive topology
- Year: 2024
- Issue: 1
- 3
- 600
- Pages: 70-79
Ensuring information security of vanets based on early detection of malicious nodes
- Year: 2024
- Issue: 2
- 0
- 486
- Pages: 95-103
Analysis and prediction of states of industrial networks with adaptive topology based on network motifs
- Year: 2024
- Issue: 3
- 1
- 508
- Pages: 94-108
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 509
- Pages: 9-21
Intelligent synthesis of cyber-resilient network structures: methods, experiments and architectural implementation
- Year: 2024
- Issue: Спецвыпуск
- 0
- 483
- Pages: 76-91
Criteria for synthesizing cyber resilient network structures
- Year: 2024
- Issue: Спецвыпуск
- 0
- 470
- Pages: 92-103
Development of a mechanism to control message integrity on the local network of vehicles
- Year: 2021
- Issue: 4
- 0
- 455
- Pages: 91-100
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 508
- Pages: 62-78
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
- Year: 2021
- Issue: 1
- 2
- 509
- Pages: 109-116
Anomaly detection in cyber-physical systems using graph neural networks
- Year: 2021
- Issue: 2
- 2
- 535
- Pages: 21-40
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
- Year: 2023
- Issue: 1
- 3
- 617
- Pages: 9-16
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 418
- Pages: 9-15
IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION
- Year: 2022
- Issue: 2
- 0
- 361
- Pages: 65-72
Approaches to building situational control systems for cyberphysical systems overview
- Year: 2021
- Issue: 3
- 0
- 397
- Pages: 137-144
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 373
- Pages: 135-147
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
- Year: 2023
- Issue: 2
- 0
- 354
- Pages: 123-139
METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS
- Year: 2022
- Issue: 3
- 0
- 350
- Pages: 36-44
SYSTEMATIZATION OF CYBER THREATS TO LARGE-SCALE SYSTEMS WITH ADAPTIVE NETWORK TOPOLOGY
- Year: 2022
- Issue: 3
- 0
- 338
- Pages: 55-67
A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY
- Year: 2022
- Issue: 3
- 1
- 340
- Pages: 68-79
CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM
- Year: 2022
- Issue: 4
- 1
- 321
- Pages: 35-42
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
- Year: 2023
- Issue: 3
- 1
- 363
- Pages: 117-125
Analysis of cyber threat intelligence information exchange systems
- Year: 2023
- Issue: 4
- 1
- 347
- Pages: 19-30
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 0
- 21
- Pages: 69-86