Articles from section "Software security"

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 1
  • 73
  • Pages: 118-126

Research of information security problems of heterogeneous corporate computer networks

Software security
  • Year: 2021
  • Issue: 4
  • 1
  • 89
  • Pages: 26-38

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 0
  • 78
  • Pages: 9-25

A method for detecting floating exploits in software at the final stage of development

Software security
  • Year: 2024
  • Issue: 4
  • 4
  • 114
  • Pages: 22-32

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 1
  • 114
  • Pages: 9-21

Analysis and forecasting the states of industrial networks with adaptive topology based on network motives

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 111
  • Pages: 142-154

Approach to creating personalised LLM agents based on MBTI personality traits

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 124
  • Pages: 127-141

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 0
  • 112
  • Pages: 109-126

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 11
  • 174
  • Pages: 138-151

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 0
  • 109
  • Pages: 130-137

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 217
  • Pages: 134-141

Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects

Software security
  • Year: 2024
  • Issue: 1
  • 1
  • 212
  • Pages: 121-133

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 5
  • 227
  • Pages: 32-40

ASPECTS OF DETECTING MALICIOUS INSTALLATION FILES USING MACHINE LEARNING ALGORITHMS

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 213
  • Pages: 37-46

Detecting source code fragments similarity with machine learning algorithms

Software security
  • Year: 2023
  • Issue: 1
  • 1
  • 209
  • Pages: 62-71

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 5
  • 281
  • Pages: 83-96

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 8
  • 362
  • Pages: 30-39

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 11
  • 318
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 30
  • 398
  • Pages: 9-19

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 302
  • Pages: 69-82