Articles from section "Software security"

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 1
  • 196
  • Pages: 72-83

Risk assessment of the use of open source projects: a method for analyzing metrics of the development process

Software security
  • Year: 2023
  • Issue: 4
  • 0
  • 172
  • Pages: 61-71

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 173
  • Pages: 70-81

Risk assessment of using open source projects: analysis of existing approaches

Software security
  • Year: 2023
  • Issue: 3
  • 1
  • 211
  • Pages: 58-69

Analysis of decompiled program code using abstract syntax trees

Software security
  • Year: 2023
  • Issue: 2
  • 2
  • 194
  • Pages: 47-60

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 231
  • Pages: 27-33

Encrypted files detection algorithm

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 256
  • Pages: 16-26

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 1
  • 223
  • Pages: 9-15

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 1
  • 296
  • Pages: 118-126

Research of information security problems of heterogeneous corporate computer networks

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 337
  • Pages: 26-38

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 0
  • 315
  • Pages: 9-25

A method for detecting floating exploits in software at the final stage of development

Software security
  • Year: 2024
  • Issue: 4
  • 4
  • 323
  • Pages: 22-32

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 334
  • Pages: 9-21

Analysis and forecasting the states of industrial networks with adaptive topology based on network motives

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 322
  • Pages: 142-154

Approach to creating personalised LLM agents based on MBTI personality traits

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 380
  • Pages: 127-141

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 2
  • 328
  • Pages: 109-126

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 14
  • 412
  • Pages: 138-151

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 0
  • 353
  • Pages: 130-137

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 433
  • Pages: 134-141

Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects

Software security
  • Year: 2024
  • Issue: 1
  • 1
  • 436
  • Pages: 121-133

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 5
  • 449
  • Pages: 32-40

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 423
  • Pages: 37-46

Detecting source code fragments similarity with machine learning algorithms

Software security
  • Year: 2023
  • Issue: 1
  • 1
  • 427
  • Pages: 62-71

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 7
  • 525
  • Pages: 83-96

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 15
  • 664
  • Pages: 30-39

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 17
  • 566
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 41
  • 701
  • Pages: 9-19

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 532
  • Pages: 69-82