Articles by keywords "cybersecurity"
Assessment of the descriptive ability of modern data sources for analyzing cyber security threats
- Year: 2024
- Issue: Спецвыпуск
- 0
- 107
- Pages: 129-145
Method for searching for clones of program code in binary executable files
- Year: 2024
- Issue: Спецвыпуск
- 0
- 107
- Pages: 46-55
Formal statement of the problem of morphizing executive code during the work of software
- Year: 2024
- Issue: Спецвыпуск
- 0
- 104
- Pages: 17-23
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 1
- 122
- Pages: 9-21
Global practices in regulating and implementing generative artificial intelligence in higher education
- Year: 2025
- Issue: 3
- 23
- 377
- Pages: 192-212
Optimization of computer incident investigation algorithm in SIEM systems
- Year: 2025
- Issue: 3
- 5
- 316
- Pages: 69-80