Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Intelligent recommender system for counteracting network attacks
- 0
- 312
- Pages: 24-30
Method for searching for clones of program code in binary executable files
- 0
- 316
- Pages: 46-55
Criteria for synthesizing cyber resilient network structures
- 0
- 306
- Pages: 92-103
Protection of ad-hoc networks against distributed scanning from the Internet
- 0
- 318
- Pages: 118-128
Verification of access control in big data systems using temporal logics
- 1
- 320
- Pages: 146-156
Methodology for finding errors and nondeclared features in software
- 0
- 308
- Pages: 157-164