Search
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2025
Year: 2025
Issue: 1
Pages: 164
9
994
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Optimization of indicator of compromise utilization in information security tasks
Information security aspects
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
1
99
Pages: 9-20
Protecting neural network models from privacy violation threats in federated learning using optimization methods
Machine learning and knowledge control systems
Bezborodov P. D.
Lavrova D. S.
0
97
Pages: 21-29
From «black box» to transparency: philosophical and methodological foundations of explainability and interpretability in artificial intelligence
Machine learning and knowledge control systems
Biryukov D. N.
Suprun A. F.
0
87
Pages: 30-42
From exploitation to protection: a deep dive into adversarial attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
1
96
Pages: 43-58
Detecting adversarial samples in intrusion detection systems using machine learning models
Machine learning and knowledge control systems
Kirillov R. B.
Kalinin M. O.
1
90
Pages: 59-68
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
Software security
Bugaev V. A.
Zhukovskii E. V.
Lyrchikov A. A.
2
97
Pages: 69-82
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
Software security
Lomako A. G.
Isaev N. E.
Menisov A. B.
Sabirov T. R.
3
78
Pages: 83-96
Multiple signatures on elliptic curve isogenies with masking and participant authentication
Applied cryptography
Kostin S. O.
Aleksandrova E. B.
0
54
Pages: 97-105
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
Applied cryptography
Shenets N. N.
Aleksandrova E. B.
Konoplev A. S.
Gololobov N. V.
1
60
Pages: 106-120
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
Network and telecommunication security
Novikov P. A.
Dichenko S. A.
Lukyanov R. V.
Polikarenkov S. V.
Martynov M. L.
0
58
Pages: 121-131
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
Network and telecommunication security
Pahomov M. A.
0
61
Pages: 132-144
Anonymization of network traffic in blockchain systems by using garlic routing
Network and telecommunication security
Skrypnikov A. K.
Krundyshev V. M.
Kalinin M. O.
0
56
Pages: 145-154
Automation of archiving for atmospheric precipitation measurement information
Technological systems, algorithmization of tasks and control objects modeling
Sikarev I. A.
Abramov V. M.
Prostakevich K. S.
Abramova A. L.
Chestnov A. I.
0
61
Pages: 155-163
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept