No. 1, 2025
Year: 2025
Issue: 1
Pages: 164
9
994

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • 1
  • 99
  • Pages: 9-20

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • 0
  • 97
  • Pages: 21-29

From «black box» to transparency: philosophical and methodological foundations of explainability and interpretability in artificial intelligence

Machine learning and knowledge control systems
  • 0
  • 87
  • Pages: 30-42

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • 1
  • 96
  • Pages: 43-58

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • 1
  • 90
  • Pages: 59-68

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • 2
  • 97
  • Pages: 69-82

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • 3
  • 78
  • Pages: 83-96

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • 0
  • 54
  • Pages: 97-105

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • 1
  • 60
  • Pages: 106-120

A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security

Network and telecommunication security
  • 0
  • 58
  • Pages: 121-131

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • 0
  • 61
  • Pages: 132-144

Anonymization of network traffic in blockchain systems by using garlic routing

Network and telecommunication security
  • 0
  • 56
  • Pages: 145-154

Automation of archiving for atmospheric precipitation measurement information

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 61
  • Pages: 155-163