No. 3, 2025
Year: 2025
Issue: 3
Pages: 213
231
11670
Publication schedule
  • №1 March 2026

Fuzzing of closed-source software using large language models

Software security
  • 47
  • 895
  • Pages: 9-19

Generalized method for comparative analysis of fuzz testing tools

Software security
  • 19
  • 766
  • Pages: 20-29

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • 21
  • 857
  • Pages: 30-39

A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method

Network and telecommunication security
  • 7
  • 754
  • Pages: 40-54

Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task

Network and telecommunication security
  • 7
  • 762
  • Pages: 55-68

Optimization of computer incident investigation algorithm in SIEM systems

Network and telecommunication security
  • 8
  • 766
  • Pages: 69-80

Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model

Critical information infrastructure security
  • 8
  • 697
  • Pages: 81-90

Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes

Critical information infrastructure security
  • 7
  • 712
  • Pages: 91-99

Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms

Critical information infrastructure security
  • 3
  • 708
  • Pages: 100-109

From exploitation to protection: analysis of methods for defending against attacks on LLMS

Machine learning and knowledge control systems
  • 23
  • 824
  • Pages: 110-120

Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences

Machine learning and knowledge control systems
  • 8
  • 774
  • Pages: 121-146

Research of adversarial attacks on classical machine learning models in the context of network threat detection

Machine learning and knowledge control systems
  • 24
  • 799
  • Pages: 147-164

Optimization of data obfuscation in big data processing and storage systems

Applied cryptography
  • 2
  • 709
  • Pages: 165-179

On the question of the applicability of the statistics of the measure «chi-square» in the problem of determining the parameters of block encryption algorithms

Applied cryptography
  • 15
  • 751
  • Pages: 180-191

Global practices in regulating and implementing generative artificial intelligence in higher education

Specialist training
  • 32
  • 896
  • Pages: 192-212