Publication schedule
-
№1 March 2026
Articles by keywords "software"
Adaptive architecture for secure remote access to corporate hosting services
- Year: 2026
- Issue: 1
- 1
- 18
- Pages: 99-108
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
- Year: 2023
- Issue: 4
- 0
- 340
- Pages: 133-144
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 2
- 353
- Pages: 61-71
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 3
- 410
- Pages: 58-69
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 418
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 3
- 469
- Pages: 118-126
Detection of network attacks in software-defined networks using isolating forest algorithm
- Year: 2021
- Issue: 1
- 0
- 508
- Pages: 62-78
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 503
- Pages: 9-25
Methodology for finding errors and nondeclared features in software
- Year: 2024
- Issue: Спецвыпуск
- 1
- 479
- Pages: 157-164
Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture
- Year: 2024
- Issue: Спецвыпуск
- 1
- 481
- Pages: 104-117
Vulnerability detection in multicomponent software using a set of generalized code graph representations
- Year: 2024
- Issue: Спецвыпуск
- 0
- 484
- Pages: 65-75
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 479
- Pages: 142-154
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 535
- Pages: 130-137
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 585
- Pages: 134-141
Detecting source code fragments similarity with machine learning algorithms
- Year: 2023
- Issue: 1
- 1
- 586
- Pages: 62-71
Protection of DevOps pipelines: automation of security within DevSecOps
- Year: 2025
- Issue: 2
- 10
- 800
- Pages: 21-34
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 7
- 715
- Pages: 83-96