No. 4, 2025
Year: 2025
Issue: 4
Pages: 184
145
5002

Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks

Information security application
  • 39
  • 505
  • Pages: 9-22

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • 15
  • 381
  • Pages: 23-34

A model for implementing artificial intelligence into embedded systems

Cyber-physic systems security
  • 12
  • 385
  • Pages: 35-47

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • 1
  • 384
  • Pages: 48-58

Authentication of electronic vehicle control units based on hidden channels

Cyber-physic systems security
  • 14
  • 414
  • Pages: 59-75

Security issues in federated learning systems

Applied cryptography
  • 6
  • 367
  • Pages: 76-88

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • 19
  • 523
  • Pages: 89-101

Systemic automation of geoinformation support for autonomous navigation safety in Arctic under climate change

Technological systems, algorithmization of tasks and control objects modeling
  • 3
  • 352
  • Pages: 102-109

Software for detecting potentially dangerous items at mass event entries using computer vision

Technological systems, algorithmization of tasks and control objects modeling
  • 4
  • 340
  • Pages: 110-120

Deep learning models for effective detection of fake news

Machine learning and knowledge control systems
  • 8
  • 405
  • Pages: 121-137

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • 18
  • 532
  • Pages: 138-162

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • 6
  • 414
  • Pages: 163-183