Publication schedule
-
№1 March 2026
Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Software security"
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 0
- 17
- Pages: 69-86
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 0
- 14
- Pages: 58-68
Investigation of the confidential containers performance in fog computing for object detection tasks
- Year: 2026
- Issue: 1
- 2
- 14
- Pages: 31-57
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 2
- 351
- Pages: 61-71
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 3
- 408
- Pages: 58-69
Analysis of decompiled program code using abstract syntax trees
- Year: 2023
- Issue: 2
- 2
- 376
- Pages: 47-60
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 452
- Pages: 27-33
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 416
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 3
- 467
- Pages: 118-126
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 501
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 2
- 501
- Pages: 9-25
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 489
- Pages: 22-32
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 506
- Pages: 9-21
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 477
- Pages: 142-154
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 1
- 556
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 492
- Pages: 109-126
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 14
- 597
- Pages: 138-151
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 1
- 533
- Pages: 130-137
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 583
- Pages: 134-141
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 6
- 614
- Pages: 32-40
Aspects of detecting malicious installation files using machine learning algorithms
- Year: 2023
- Issue: 2
- 0
- 579
- Pages: 37-46
Detecting source code fragments similarity with machine learning algorithms
- Year: 2023
- Issue: 1
- 1
- 584
- Pages: 62-71
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 7
- 713
- Pages: 83-96
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 21
- 855
- Pages: 30-39
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 19
- 764
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 47
- 893
- Pages: 9-19
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 713
- Pages: 69-82