No. 1, 2025
Year: 2025
Issue: 1
Pages: 164
65
6972

Optimization of indicator of compromise utilization in information security tasks

Information security aspects
  • 10
  • 575
  • Pages: 9-20

Protecting neural network models from privacy violation threats in federated learning using optimization methods

Machine learning and knowledge control systems
  • 3
  • 557
  • Pages: 21-29

From «black box» to transparency: philosophical and methodological foundations of explainability and interpretability in artificial intelligence

Machine learning and knowledge control systems
  • 7
  • 568
  • Pages: 30-42

From exploitation to protection: a deep dive into adversarial attacks on LLMS

Machine learning and knowledge control systems
  • 9
  • 571
  • Pages: 43-58

Detecting adversarial samples in intrusion detection systems using machine learning models

Machine learning and knowledge control systems
  • 9
  • 550
  • Pages: 59-68

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • 6
  • 532
  • Pages: 69-82

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • 7
  • 525
  • Pages: 83-96

Multiple signatures on elliptic curve isogenies with masking and participant authentication

Applied cryptography
  • 2
  • 510
  • Pages: 97-105

General solution to the special problem of distributing shares using Shamir’s secret sharing scheme

Applied cryptography
  • 4
  • 519
  • Pages: 106-120

A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security

Network and telecommunication security
  • 5
  • 536
  • Pages: 121-131

Model of node interaction in a mobile ad-hoc network considering protection against active network attacks

Network and telecommunication security
  • 0
  • 495
  • Pages: 132-144

Anonymization of network traffic in blockchain systems by using garlic routing

Network and telecommunication security
  • 3
  • 506
  • Pages: 145-154

Automation of archiving for atmospheric precipitation measurement information

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 528
  • Pages: 155-163