Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Software security"
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 0
- 172
- Pages: 61-71
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 1
- 211
- Pages: 58-69
Analysis of decompiled program code using abstract syntax trees
- Year: 2023
- Issue: 2
- 2
- 194
- Pages: 47-60
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 231
- Pages: 27-33
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 1
- 223
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 1
- 296
- Pages: 118-126
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 337
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 0
- 315
- Pages: 9-25
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 4
- 323
- Pages: 22-32
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 334
- Pages: 9-21
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 322
- Pages: 142-154
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 1
- 380
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 328
- Pages: 109-126
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 14
- 412
- Pages: 138-151
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 0
- 353
- Pages: 130-137
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 433
- Pages: 134-141
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 5
- 449
- Pages: 32-40
Aspects of detecting malicious installation files using machine learning algorithms
- Year: 2023
- Issue: 2
- 0
- 423
- Pages: 37-46
Detecting source code fragments similarity with machine learning algorithms
- Year: 2023
- Issue: 1
- 1
- 427
- Pages: 62-71
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 7
- 525
- Pages: 83-96
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 15
- 664
- Pages: 30-39
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 17
- 566
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 41
- 701
- Pages: 9-19
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 532
- Pages: 69-82