No. 4, 2025
Year: 2025
Issue: 4
Pages: 184
216
7643

Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks

Information security application
  • 54
  • 749
  • Pages: 9-22

Determining the optimal response time to information security threats in a limited resource environment

Information security application
  • 24
  • 580
  • Pages: 23-34

A model for implementing artificial intelligence into embedded systems

Cyber-physic systems security
  • 14
  • 586
  • Pages: 35-47

Method of determining the criticality of elements of a complex technical system

Cyber-physic systems security
  • 4
  • 598
  • Pages: 48-58

Authentication of electronic vehicle control units based on hidden channels

Cyber-physic systems security
  • 16
  • 618
  • Pages: 59-75

Security issues in federated learning systems

Applied cryptography
  • 11
  • 564
  • Pages: 76-88

On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2

Applied cryptography
  • 27
  • 763
  • Pages: 89-101

Systemic automation of geoinformation support for autonomous navigation safety in Arctic under climate change

Technological systems, algorithmization of tasks and control objects modeling
  • 4
  • 542
  • Pages: 102-109

Software for detecting potentially dangerous items at mass event entries using computer vision

Technological systems, algorithmization of tasks and control objects modeling
  • 10
  • 544
  • Pages: 110-120

Deep learning models for effective detection of fake news

Machine learning and knowledge control systems
  • 10
  • 618
  • Pages: 121-137

Methodological and technological foundations for countering cognitive threats in generative multimodal content

Machine learning and knowledge control systems
  • 32
  • 819
  • Pages: 138-162

The impact of adversarial attacks on deep learning models

Machine learning and knowledge control systems
  • 10
  • 662
  • Pages: 163-183