Search
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2025
Year: 2025
Issue: 3
Pages: 213
30
1364
Previous issue
All issues
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Fuzzing of closed-source software using large language models
Software security
Gavrichkov D. A.
Ovasapyan T. D.
Ivanov D. V.
7
128
Pages: 9-19
Generalized method for comparative analysis of fuzz testing tools
Software security
Ognev R. A.
Zegzhda D. P.
4
92
Pages: 20-29
Analysis of methods for detecting malicious software using large language models and eBPF technology
Software security
Pavlenko E. Yu.
Ivanov M. S.
0
91
Pages: 30-39
A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method
Network and telecommunication security
Gofman M. V.
Kornienko A. A.
0
81
Pages: 40-54
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
Network and telecommunication security
Zhukov I. Yu.
Balashova E. E.
Mandrov A. P.
Kravchenko N. D.
0
82
Pages: 55-68
Optimization of computer incident investigation algorithm in SIEM systems
Network and telecommunication security
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
2
91
Pages: 69-80
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
Critical information infrastructure security
Vasiliev O. S.
Krundyshev V. M.
Kalinin M. O.
2
84
Pages: 81-90
Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes
Critical information infrastructure security
Zavadskii E. V.
2
84
Pages: 91-99
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
Critical information infrastructure security
Kurakin A. S.
0
79
Pages: 100-109
From exploitation to protection: analysis of methods for defending against attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
2
102
Pages: 110-120
Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences
Machine learning and knowledge control systems
Spirin A. A.
Ikonnikov A. V.
Matuhina E. N.
1
87
Pages: 121-146
Research of adversarial attacks on classical machine learning models in the context of network threat detection
Machine learning and knowledge control systems
Yugai P. E.
0
89
Pages: 147-164
Optimization of data obfuscation in big data processing and storage systems
Applied cryptography
Poltavtseva M. A.
0
81
Pages: 165-179
On the question of the applicability of the statistics of the measure «chi-square» in the problem of determining the parameters of block encryption algorithms
Applied cryptography
Mironkin V. O.
Yurasov N. A.
8
95
Pages: 180-191
Global practices in regulating and implementing generative artificial intelligence in higher education
Specialist training
Biryukov D. N.
Suprun A. F.
Biryukova A. D.
2
98
Pages: 192-212
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept