No. 4, 2024
Year: 2024
Issue: 4
Pages: 162
16
5936
Publication schedule
  • №1 March 2026

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • 2
  • 508
  • Pages: 9-21

A method for detecting floating exploits in software at the final stage of development

Software security
  • 4
  • 491
  • Pages: 22-32

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • 1
  • 458
  • Pages: 33-41

Research of information security audit problems of geographically distributed devices of the Internet of Things

Network and telecommunication security
  • 0
  • 501
  • Pages: 42-52

Covert storage channels in the TLS protocol

Network and telecommunication security
  • 0
  • 526
  • Pages: 53-62

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • 1
  • 495
  • Pages: 63-73

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • 2
  • 537
  • Pages: 74-84

Automation of active power flows evaluation

Research, monitoring and optimization of automated technological processes and productions control systems
  • 0
  • 456
  • Pages: 85-93

A protection method for the global model of the federated learning systems based on a trust model

Machine learning and knowledge control systems
  • 4
  • 511
  • Pages: 94-108

Prospects for the application of archigraphs in data and knowledge storage systems

Quality assessment and software systems support
  • 0
  • 465
  • Pages: 109-139

Predictive analysis of information flows in information security systems of telecommunication complexes

Quality assessment and software systems support
  • 0
  • 488
  • Pages: 140-151

Optimization of the performance of the search information system in the legislative documents database

Quality assessment and software systems support
  • 2
  • 500
  • Pages: 152-161