Thursday, October 30, 2025

INJOIT том 13, номер 11

Вышел одиннадцатый номер журнала INJOIT в 2025 году. И тринадцатый год издания журнала. В номере много работ по кибербезопасности.

Темы статей:

  • Describing Formal Languages Using L-Graphs
  • Algorithms for transforming context-free grammars into L-graphs
  • Algorithm for transforming context-free expressions into equivalent L-graphs
  • Beyond CNNs: A Study on Fisher Vectors and Their Fusion for Few-Shot Generalization
  • Attempt to create uniform indexing on subsets of columns
  • Rethinking the grouping strategy in bottom-up multi-person pose estimation
  • Optimization of Search Queries by Introducing the Concept of Weight
  • Mathematical and Computer Modeling as a Method for Studying the Hopping Conductivity of Manganites La0.5Ca0.5Mn1-xFexO3 (x = 0.6; 0.7; 0.8; 0.9)
  • Self-Organization of a Group of Digital Twins of Unmanned Transport Vehicles for Production Tasks in a Smart Workshop
  • Practical Application of the Vector-Matrix Model of Computations
  • About one Approach to Organizing a Home Distributed Computing System
  • Autonomous Vehicles Through the Prism of the Turing Test
  • Adaptation of the digital product lifecycle model for industrial enterprises: a decision-making matrix for managing B2B and internal initiatives
  • Automatic analysis of containerized application deployment models based on ontologies and knowledge graphs
  • Automated Detection and Classification of Sensitive Data in Cloud Environments
  • VOSviewer Program for Clustering and Visualizing Cyber Threat Information
  • Adversarial testing of large language models
  • The key to secure mobile signature: from password-based protection to two-party signatures
  • Modification of Niederreiter cryptosystem compact version
  • Artificial Intelligence in Cybersecurity. Chronicle. Issue 3

Архив журнала находится здесь.

No comments:

Post a Comment