Search by keyword: "vulnerabilities"
Analysis of vulnerabilities in programming in different languages
| Authors: Andreev A.M., Kuznetsov M.A., Savinchukov V.N., Sadkov F.M., Glinskaya E.V. | Published: 19.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: vulnerabilities, programming languages, software, cybersecurity, cyberattacks, secure digital environment | |
An overview of defensive and offensive artificial intelligence in cybersecurity
| Authors: Amanatidi V.S., Glinskaya E.V. | Published: 17.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: artificial intelligence, machine learning, artificial intelligence-based cyber defense systems, competitive artificial intelligence, development methodology, reinforcement learning, vulnerabilities | |
Security and threats overview in the machine learning
| Authors: Losev N.S., Glinskaya E.V. | Published: 14.02.2025 |
| Published in issue: #1(96)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: machine learning, countermeasure strategies, intruder attack data protection, protection methods, attack models, vulnerabilities, critical infrastructure | |
