Contents

Programming and Computer Software


Vol. 51, No. 6, 2025


Rabbit and Tortoise Optimization Algorithm with Mutual Information Based Adaptive Strategy for Network Intrusion Detection

T. Bhuvaneswari, K. Ruba Soundar, and R. Chandra Guru Sekar p. 359  abstract

Machine Learning-Enabled Battery Management System on FPGA for Electric Vehicles

Daisy Merina. R, Saravana Ram. R, and Lordwin Cecil Prabhaker Micheal p. 373  abstract

The Use of Computer Vision for Localization of Vertebrae on Midsagittal Computed Tomography Slices

A. R. Teplyakova and R. V. Shershnev p. 385  abstract

How to Prevent Fake Cycles in DFG Models Discovered from Event Logs?

N. D. Shaimov, I. A. Lomazova, and R. A. Nesterov p. 395  abstract

Types of Attacks against Federated Neural Networks and Protection Methods

V. A. Kostenko and A. E. Selezneva p. 409  abstract

About Methods for Extracting Algorithms from Binary Code

I. I. Kulagin, V. A. Padaryan, and V. A. Koshkin p. 415  abstract

Software Security by Design

V. V. Kuliamin, A. K. Petrenko, and E. A. Rudina p. 429  abstract

On the Implementation Time of Distributed Computing in Synchronous Mode with a Limited Number of Copies of a Software Resource

P. A. Pavlov p. 435  abstract

SLAP — Simple Linear Attack against Perceptron (SLAP)

A. I. Perminov p. 446  abstract

Static Memory Layout for Real-Time Operating Systems

S. A. Zelenova p. 453  abstract