Latest issues
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
- 2025, Issue 1
Articles from section "Software security"
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 1
- 73
- Pages: 118-126
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 1
- 89
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 0
- 78
- Pages: 9-25
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 114
- Pages: 22-32
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 1
- 114
- Pages: 9-21
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 0
- 111
- Pages: 142-154
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 0
- 124
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 0
- 112
- Pages: 109-126
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 11
- 174
- Pages: 138-151
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 109
- Pages: 130-137
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 217
- Pages: 134-141
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 5
- 227
- Pages: 32-40
ASPECTS OF DETECTING MALICIOUS INSTALLATION FILES USING MACHINE LEARNING ALGORITHMS
- Year: 2023
- Issue: 2
- 0
- 213
- Pages: 37-46
Detecting source code fragments similarity with machine learning algorithms
- Year: 2023
- Issue: 1
- 1
- 209
- Pages: 62-71
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 5
- 281
- Pages: 83-96
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 8
- 362
- Pages: 30-39
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 11
- 318
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 30
- 398
- Pages: 9-19
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 302
- Pages: 69-82