Vol. 51, No. 6, 2025
Rabbit and Tortoise Optimization Algorithm with Mutual Information Based Adaptive Strategy for Network Intrusion Detection
p. 359 abstract
Machine Learning-Enabled Battery Management System on FPGA for Electric Vehicles
p. 373 abstract
The Use of Computer Vision for Localization of Vertebrae on Midsagittal Computed Tomography Slices
p. 385 abstract
How to Prevent Fake Cycles in DFG Models Discovered from Event Logs?
p. 395 abstract
Types of Attacks against Federated Neural Networks and Protection Methods
p. 409 abstract
About Methods for Extracting Algorithms from Binary Code
p. 415 abstract
Software Security by Design
p. 429 abstract
On the Implementation Time of Distributed Computing in Synchronous Mode with a Limited Number of Copies of a Software Resource
p. 435 abstract
SLAP — Simple Linear Attack against Perceptron (SLAP)
p. 446 abstract
Static Memory Layout for Real-Time Operating Systems
p. 453 abstract