No. 4, 2025
Year: 2025
Issue: 4
Pages: 184
76
2583

Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks

Information security application
  • 14
  • 260
  • Pages: 9-22

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • 4
  • 201
  • Pages: 23-34

A model for implementing artificial intelligence into embedded systems

Cyber-physic systems security
  • 6
  • 194
  • Pages: 35-47

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • 0
  • 178
  • Pages: 48-58

Authentication of electronic vehicle control units based on hidden channels

Cyber-physic systems security
  • 13
  • 224
  • Pages: 59-75

Security issues in federated learning systems

Applied cryptography
  • 2
  • 175
  • Pages: 76-88

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • 15
  • 309
  • Pages: 89-101

Systemic automation of geoinformation support for autonomous navigation safety in Arctic under climate change

Technological systems, algorithmization of tasks and control objects modeling
  • 2
  • 170
  • Pages: 102-109

Software for detecting potentially dangerous items at mass event entries using computer vision

Technological systems, algorithmization of tasks and control objects modeling
  • 0
  • 173
  • Pages: 110-120

Deep learning models for effective detection of fake news

Machine learning and knowledge control systems
  • 5
  • 197
  • Pages: 121-137

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • 15
  • 312
  • Pages: 138-162

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • 0
  • 190
  • Pages: 163-183