No. 4, 2024
Year: 2024
Issue: 4
Pages: 162
6
1271

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • 1
  • 114
  • Pages: 9-21

A method for detecting floating exploits in software at the final stage of development

Software security
  • 4
  • 114
  • Pages: 22-32

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • 0
  • 100
  • Pages: 33-41

Research of information security audit problems of geographically distributed devices of the Internet of Things

Network and telecommunication security
  • 0
  • 106
  • Pages: 42-52

Covert storage channels in the TLS protocol

Network and telecommunication security
  • 0
  • 110
  • Pages: 53-62

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • 0
  • 101
  • Pages: 63-73

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • 1
  • 123
  • Pages: 74-84

Automation of active power flows evaluation

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 103
  • Pages: 85-93

A protection method for the global model of the federated learning systems based on a trust model

Machine learning and knowledge control systems
  • 0
  • 103
  • Pages: 94-108

Prospects for the application of archigraphs in data and knowledge storage systems

Quality assessment and software systems support
  • 0
  • 97
  • Pages: 109-139

Predictive analysis of information flows in information security systems of telecommunication complexes

Quality assessment and software systems support
  • 0
  • 100
  • Pages: 140-151

Optimization of the performance of the search information system in the legislative documents database

Quality assessment and software systems support
  • 0
  • 100
  • Pages: 152-161