Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • Research Article
  • 10.1134/s0361768825700331
Real-Time Radio Signal Classification Based on Spectrograms
  • Dec 1, 2025
  • Programming and Computer Software
  • L H Kirakosyan + 4 more

  • Research Article
  • 10.1134/s0361768825700380
Fuzzing of Polymorphic Systems within Microsevice Structures
  • Dec 1, 2025
  • Programming and Computer Software
  • A S Yurev

  • Research Article
  • 10.1134/s0361768825700355
Uncertainty Problem in High-level Model Based Trace Analysis as Part of Runtime Verification
  • Dec 1, 2025
  • Programming and Computer Software
  • A Karnov

  • Research Article
  • 10.1134/s0361768825700367
Prospects for Using a Trusted Information Analytical System Based on the Talisman Platform Using Artificial Intelligence Methods to Improve the Efficiency of Complex Hardware Systems
  • Dec 1, 2025
  • Programming and Computer Software
  • P A Kolokolnikov + 2 more

  • Research Article
  • 10.1134/s0361768825700379
The Defender’s Dilemma: Are Defense Methods Against Different Attacks on Machine Learning Models Compatible?
  • Dec 1, 2025
  • Programming and Computer Software
  • G V Sazonov + 2 more

  • Research Article
  • 10.1134/s0361768825700343
Development of a Red-Teaming Dataset to Defend Large Language Models Against Attacks
  • Dec 1, 2025
  • Programming and Computer Software
  • I S Alekseevskaia + 2 more

  • Research Article
  • 10.1134/s0361768825700239
Rabbit and Tortoise Optimization Algorithm with Mutual Information Based Adaptive Strategy for Network Intrusion Detection
  • Nov 5, 2025
  • Programming and Computer Software
  • T Bhuvaneswari + 2 more

  • Research Article
  • 10.1134/s0361768825700318
SLAP — Simple Linear Attack against Perceptron (SLAP)
  • Nov 5, 2025
  • Programming and Computer Software
  • A I Perminov

  • Research Article
  • 10.1134/s0361768825700240
Machine Learning-Enabled Battery Management System on FPGA for Electric Vehicles
  • Nov 5, 2025
  • Programming and Computer Software
  • Daisy Merina R + 2 more

  • Research Article
  • 10.1134/s0361768825700276
Types of Attacks against Federated Neural Networks and Protection Methods
  • Nov 5, 2025
  • Programming and Computer Software
  • V A Kostenko + 1 more