Latest issues
- 2026, Issue 1
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
Articles from section "Software security"
Usage of the subject-object model in the task of detecting malicious software in the Android OS
- Year: 2026
- Issue: 1
- 6
- 269
- Pages: 69-86
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
- Year: 2026
- Issue: 1
- 6
- 266
- Pages: 58-68
Investigation of the confidential containers performance in fog computing for object detection tasks
- Year: 2026
- Issue: 1
- 10
- 252
- Pages: 31-57
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
- Year: 2023
- Issue: 4
- 5
- 537
- Pages: 61-71
Risk assessment of using open source projects: analysis of existing approaches
- Year: 2023
- Issue: 3
- 3
- 599
- Pages: 58-69
Analysis of decompiled program code using abstract syntax trees
- Year: 2023
- Issue: 2
- 2
- 563
- Pages: 47-60
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
- Year: 2021
- Issue: 3
- 0
- 693
- Pages: 27-33
Identification of vulnerabilities in software for ARM processors using symbological execution
- Year: 2021
- Issue: 3
- 2
- 605
- Pages: 9-15
Detection malware based on clusterization of performed actions
- Year: 2021
- Issue: 2
- 4
- 655
- Pages: 118-126
Research of information security problems of heterogeneous corporate computer networks
- Year: 2021
- Issue: 4
- 2
- 690
- Pages: 26-38
Identification of malicious executable files based on static-dynamic analysis using machine learning
- Year: 2021
- Issue: 4
- 3
- 710
- Pages: 9-25
A method for detecting floating exploits in software at the final stage of development
- Year: 2024
- Issue: 4
- 5
- 674
- Pages: 22-32
Analysis of methods for attaching malware at the level of security rings of x86_64 processors
- Year: 2024
- Issue: 4
- 2
- 700
- Pages: 9-21
Analysis and forecasting the states of industrial networks with adaptive topology based on network motives
- Year: 2024
- Issue: 3
- 1
- 654
- Pages: 142-154
Approach to creating personalised LLM agents based on MBTI personality traits
- Year: 2024
- Issue: 3
- 2
- 748
- Pages: 127-141
Research on the performance of AutoML platforms in confidential computing
- Year: 2024
- Issue: 3
- 2
- 678
- Pages: 109-126
Identifying security flaws in the Linux kernel using system call fuzzing
- Year: 2024
- Issue: 2
- 25
- 840
- Pages: 138-151
A method for finding errors in program code based on inmemory fuzzing
- Year: 2024
- Issue: 2
- 2
- 714
- Pages: 130-137
A model for finding errors in software using spot-based fuzzing
- Year: 2024
- Issue: 1
- 3
- 743
- Pages: 134-141
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T’S MITRE KNOWLEDGE BASE
- Year: 2022
- Issue: 1
- 6
- 808
- Pages: 32-40
Aspects of detecting malicious installation files using machine learning algorithms
- Year: 2023
- Issue: 2
- 0
- 768
- Pages: 37-46
Detecting source code fragments similarity with machine learning algorithms
- Year: 2023
- Issue: 1
- 1
- 745
- Pages: 62-71
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
- Year: 2025
- Issue: 1
- 10
- 909
- Pages: 83-96
Analysis of methods for detecting malicious software using large language models and eBPF technology
- Year: 2025
- Issue: 3
- 22
- 1083
- Pages: 30-39
Generalized method for comparative analysis of fuzz testing tools
- Year: 2025
- Issue: 3
- 24
- 960
- Pages: 20-29
Fuzzing of closed-source software using large language models
- Year: 2025
- Issue: 3
- 52
- 1104
- Pages: 9-19
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
- Year: 2025
- Issue: 1
- 6
- 912
- Pages: 69-82