Special Issue, 2025
Year: 2025
Issue: Спецвыпуск
Pages: 189
4
389

Integration of guidance-based recovery mechanism into the learning with errors-based digital signature

  • 0
  • 28
  • Pages: 10-22

Lattice-based commitement scheme for proving linear relations over hidden values

  • 0
  • 24
  • Pages: 23-33

Countering illegitimate smart voice assistant triggering

  • 0
  • 24
  • Pages: 34-47

Using entropy metrics to detect data integrity attacks in real-time

  • 0
  • 24
  • Pages: 48-57

Application of large language models in event forecasting field

  • 0
  • 26
  • Pages: 58-68

Data processing and mining to detect a data privacy violations from internal intruder in a DBMS

  • 0
  • 25
  • Pages: 69-81

Detection of fake news spread using machine learning

  • 0
  • 24
  • Pages: 82-98

An automated method for assessing the correctness of distributed algorithms using chaos engineering testing

  • 0
  • 24
  • Pages: 99-111

Automated security analysis of software for the Android operating system

  • 0
  • 24
  • Pages: 112-123

The architecture of a software package for wireless ad-hoc network protection from active network attacks

  • 0
  • 26
  • Pages: 124-133

The use of convolutional neural networks to enhance the security of steganographic methods

  • 0
  • 27
  • Pages: 134-144

Hiding data in audio files using coverless steganography methods

  • 1
  • 29
  • Pages: 145-155

Information model for countering the illegal distribution of personal data in information systems

  • 0
  • 25
  • Pages: 156-167

Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment

  • 3
  • 34
  • Pages: 168-178

Automating of container images security scanning and analysis

  • 0
  • 25
  • Pages: 179-188