Articles by keywords "Software"
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
- Year: 2023
- Issue: 4
- 0
- 130
- Pages: 133-144
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 0
- 127
- Pages: 61-71
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 1
- 167
- Pages: 58-69
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 1
- 180
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 1
- 252
- Pages: 118-126
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 276
- Pages: 62-78
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 0
- 257
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 271
- Pages: 157-164
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 269
- Pages: 104-117
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 280
- Pages: 65-75
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 281
- Pages: 142-154
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 296
- Pages: 130-137
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 397
- Pages: 134-141
Detecting source code fragments similarity with machine learning algorithms
- Year: 2023
- Issue: 1
- 1
- 374
- Pages: 62-71
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 6
- 503
- Pages: 21-34
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 5
- 475
- Pages: 83-96