No. 4, 2024
Year: 2024
Issue: 4
Pages: 162
29
8156

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • 2
  • 699
  • Pages: 9-21

A method for detecting floating exploits in software at the final stage of development

Software security
  • 5
  • 673
  • Pages: 22-32

Identification of subscriber terminals with multithreaded pipeline organization of calculations for database formation

Network and telecommunication security
  • 2
  • 633
  • Pages: 33-41

Research of information security audit problems of geographically distributed devices of the Internet of Things

Network and telecommunication security
  • 2
  • 681
  • Pages: 42-52

Covert storage channels in the TLS protocol

Network and telecommunication security
  • 2
  • 733
  • Pages: 53-62

Software tool for managing the access control model for the corporate portal

Network and telecommunication security
  • 1
  • 681
  • Pages: 63-73

Key pre-distribution technique using Shamir’s secret sharing scheme

Applied cryptography
  • 6
  • 741
  • Pages: 74-84

Automation of active power flows evaluation

Research, monitoring and optimization of automated technological processes and productions control systems
  • 1
  • 626
  • Pages: 85-93

A protection method for the global model of the federated learning systems based on a trust model

Machine learning and knowledge control systems
  • 4
  • 697
  • Pages: 94-108

Prospects for the application of archigraphs in data and knowledge storage systems

Quality assessment and software systems support
  • 1
  • 643
  • Pages: 109-139

Predictive analysis of information flows in information security systems of telecommunication complexes

Quality assessment and software systems support
  • 1
  • 683
  • Pages: 140-151

Optimization of the performance of the search information system in the legislative documents database

Quality assessment and software systems support
  • 2
  • 666
  • Pages: 152-161