Articles from section "Software security"

Usage of the subject-object model in the task of detecting malicious software in the Android OS

Software security
  • Year: 2026
  • Issue: 1
  • 6
  • 269
  • Pages: 69-86

Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models

Software security
  • Year: 2026
  • Issue: 1
  • 6
  • 266
  • Pages: 58-68

Investigation of the confidential containers performance in fog computing for object detection tasks

Software security
  • Year: 2026
  • Issue: 1
  • 10
  • 252
  • Pages: 31-57

Malware detection using deep neural networks

Software security
  • Year: 2023
  • Issue: 4
  • 3
  • 583
  • Pages: 72-83

Risk assessment of the use of open source projects: a method for analyzing metrics of the development process

Software security
  • Year: 2023
  • Issue: 4
  • 5
  • 537
  • Pages: 61-71

Systematization of methods for finding errors in software

Software security
  • Year: 2023
  • Issue: 3
  • 0
  • 520
  • Pages: 70-81

Risk assessment of using open source projects: analysis of existing approaches

Software security
  • Year: 2023
  • Issue: 3
  • 3
  • 599
  • Pages: 58-69

Analysis of decompiled program code using abstract syntax trees

Software security
  • Year: 2023
  • Issue: 2
  • 2
  • 563
  • Pages: 47-60

Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 693
  • Pages: 27-33

Encrypted files detection algorithm

Software security
  • Year: 2021
  • Issue: 3
  • 0
  • 697
  • Pages: 16-26

Identification of vulnerabilities in software for ARM processors using symbological execution

Software security
  • Year: 2021
  • Issue: 3
  • 2
  • 605
  • Pages: 9-15

Detection malware based on clusterization of performed actions

Software security
  • Year: 2021
  • Issue: 2
  • 4
  • 655
  • Pages: 118-126

Research of information security problems of heterogeneous corporate computer networks

Software security
  • Year: 2021
  • Issue: 4
  • 2
  • 690
  • Pages: 26-38

Identification of malicious executable files based on static-dynamic analysis using machine learning

Software security
  • Year: 2021
  • Issue: 4
  • 3
  • 710
  • Pages: 9-25

A method for detecting floating exploits in software at the final stage of development

Software security
  • Year: 2024
  • Issue: 4
  • 5
  • 674
  • Pages: 22-32

Analysis of methods for attaching malware at the level of security rings of x86_64 processors

Software security
  • Year: 2024
  • Issue: 4
  • 2
  • 700
  • Pages: 9-21

Analysis and forecasting the states of industrial networks with adaptive topology based on network motives

Software security
  • Year: 2024
  • Issue: 3
  • 1
  • 654
  • Pages: 142-154

Approach to creating personalised LLM agents based on MBTI personality traits

Software security
  • Year: 2024
  • Issue: 3
  • 2
  • 748
  • Pages: 127-141

Research on the performance of AutoML platforms in confidential computing

Software security
  • Year: 2024
  • Issue: 3
  • 2
  • 678
  • Pages: 109-126

Identifying security flaws in the Linux kernel using system call fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 25
  • 840
  • Pages: 138-151

A method for finding errors in program code based on inmemory fuzzing

Software security
  • Year: 2024
  • Issue: 2
  • 2
  • 714
  • Pages: 130-137

A model for finding errors in software using spot-based fuzzing

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 743
  • Pages: 134-141

Modeling of embedded software for hardware platforms based on processors with ARM architecture using the features of potentially dangerous functional objects

Software security
  • Year: 2024
  • Issue: 1
  • 3
  • 764
  • Pages: 121-133

ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE

Software security
  • Year: 2022
  • Issue: 1
  • 6
  • 808
  • Pages: 32-40

Aspects of detecting malicious installation files using machine learning algorithms

Software security
  • Year: 2023
  • Issue: 2
  • 0
  • 768
  • Pages: 37-46

Detecting source code fragments similarity with machine learning algorithms

Software security
  • Year: 2023
  • Issue: 1
  • 1
  • 745
  • Pages: 62-71

An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models

Software security
  • Year: 2025
  • Issue: 1
  • 10
  • 909
  • Pages: 83-96

Analysis of methods for detecting malicious software using large language models and eBPF technology

Software security
  • Year: 2025
  • Issue: 3
  • 22
  • 1083
  • Pages: 30-39

Generalized method for comparative analysis of fuzz testing tools

Software security
  • Year: 2025
  • Issue: 3
  • 24
  • 960
  • Pages: 20-29

Fuzzing of closed-source software using large language models

Software security
  • Year: 2025
  • Issue: 3
  • 52
  • 1104
  • Pages: 9-19

Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior

Software security
  • Year: 2025
  • Issue: 1
  • 6
  • 912
  • Pages: 69-82