Publication schedule
  • №1 March 2026

Articles from section "Software security"

Usage of the subject-object model in the task of detecting malicious software in the Android OS

Software security
  • Year: 2026
  • Issue: 1
  • 0
  • 17
  • Pages: 69-86

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 0
  • 14
  • Pages: 58-68

Investigation of the confidential containers performance in fog computing for object detection tasks

Software security
  • Year: 2026
  • Issue: 1
  • 2
  • 14
  • Pages: 31-57

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 3
  • 383
  • Pages: 72-83

Risk assessment of the use of open source projects: a method for analyzing metrics of the development process

Software security
  • Year: 2023
  • Issue: 4
  • 2
  • 351
  • Pages: 61-71

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 336
  • Pages: 70-81

Risk assessment of using open source projects: analysis of existing approaches

Software security
  • Year: 2023
  • Issue: 3
  • 3
  • 408
  • Pages: 58-69

Analysis of decompiled program code using abstract syntax trees

Software security
  • Year: 2023
  • Issue: 2
  • 2
  • 376
  • Pages: 47-60

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 452
  • Pages: 27-33

Encrypted files detection algorithm

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 481
  • Pages: 16-26

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 2
  • 416
  • Pages: 9-15

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 3
  • 467
  • Pages: 118-126

Research of information security problems of heterogeneous corporate computer networks

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 501
  • Pages: 26-38

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 501
  • Pages: 9-25

A method for detecting floating exploits in software at the final stage of development

Software security
  • Year: 2024
  • Issue: 4
  • 4
  • 489
  • Pages: 22-32

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 506
  • Pages: 9-21

Analysis and forecasting the states of industrial networks with adaptive topology based on network motives

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 477
  • Pages: 142-154

Approach to creating personalised LLM agents based on MBTI personality traits

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 556
  • Pages: 127-141

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 2
  • 492
  • Pages: 109-126

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 14
  • 597
  • Pages: 138-151

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 1
  • 533
  • Pages: 130-137

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 583
  • Pages: 134-141

Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 594
  • Pages: 121-133

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 6
  • 614
  • Pages: 32-40

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 579
  • Pages: 37-46

Detecting source code fragments similarity with machine learning algorithms

Software security
  • Year: 2023
  • Issue: 1
  • 1
  • 584
  • Pages: 62-71

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 7
  • 713
  • Pages: 83-96

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 21
  • 855
  • Pages: 30-39

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 19
  • 764
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 47
  • 893
  • Pages: 9-19

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 713
  • Pages: 69-82