Latest issues
- 2026, Issue 1
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
Intelligent recommender system for counteracting network attacks
- 0
- 652
- Pages: 24-30
Method for searching for clones of program code in binary executable files
- 0
- 664
- Pages: 46-55
Criteria for synthesizing cyber resilient network structures
- 0
- 639
- Pages: 92-103
Protection of ad-hoc networks against distributed scanning from the Internet
- 0
- 676
- Pages: 118-128
Verification of access control in big data systems using temporal logics
- 1
- 660
- Pages: 146-156
Methodology for finding errors and nondeclared features in software
- 1
- 662
- Pages: 157-164