Выпуск №
2/2025
Информационные технологии и безопасность
1 INTEGRATION OF NEURAL NETWORKS IN CYBERSECURITY OF DISTRIBUTED CLOUD SYSTEMS
Sapegina V.A.
Abstract : This article explores the integration of neural networks into cybersecurity frameworks for distributed cloud systems. The study examines architectural requirements, deployment strategies, model robustness, and resilience to adversarial attacks. Particular attention is paid to real-time anomaly detection, scalability, and the challenges of maintaining model integrity across decentralized environments. The proposed approaches demonstrate the effectiveness of neural models in enhancing threat detection and adaptive defense mechanisms in complex cloud infrastructures.
Keywords: neural networks, cybersecurity, distributed cloud systems, anomaly detection, adversarial training, model robustness, threat intelligence, scalability.
2 DETECTION OF MALICIOUS ANOMALIES IN IOT-DEVICES USING DEEP LEARNING
Kosheleva E.D., Klychev A.M.
Abstract : Deep learning techniques are increasingly used to detect malicious anomalies in IoT environments, where traditional security mechanisms fail to scale or adapt to dynamic data flows. This study evaluates various neural network architectures suitable for constrained devices, analyzes deployment models from edge to cloud, and examines the resilience of DL systems to adversarial threats. Practical implementation details, including preprocessing pipelines and lightweight inference, are presented alongside comparative performance metrics. Challenges related to data availability, explainability, and system heterogeneity are identified as critical barriers to widespread adoption.
Keywords: IoT security, anomaly detection, deep learning, edge computing, neural networks, adversarial robustness, model deployment, cyber threats.
3 THE EVOLUTION OF WEB ARCHITECTURES: FROM MONOLITHS TO EDGE COMPUTING
Roilian M.
Abstract : The article explores the stages in the evolution of web architectures within the context of industrial IT systems – from monolithic and centralized solutions to distributed models, including edge computing. It analyzes architectural and network transformations associated with the shift toward edge-based computation, as well as the impact of these changes on fault tolerance, processing latency, and node autonomy. It is emphasized that the implementation of edge infrastructures requires new approaches to containerization, communication protocols, and security. Special attention is given to the use of edge computing for inventory management, production processes, and integration with ERP/SCADA systems. Practical examples from high-precision manufacturing and logistics sectors are presented. The article underscores the need to rethink architectural principles in the era of industrial digitalization.
Keywords: web architectures, edge computing, containerization, industry, protocols, microservices.
4 APPLICATION OF QUANTUM ALGORITHMS IN BIG DATA ANALYSIS
Khusainov T.Zh.
Abstract : This article investigates the application of quantum algorithms in the domain of big data analysis, focusing on their theoretical foundations, architectural integration, and sector-specific use cases. The study provides a comparative assessment of classical and quantum approaches to core analytic tasks such as search, optimization, and dimensionality reduction. Key attention is given to hybrid quantum–classical models, implementation challenges, system security, and operational reliability. The article concludes with an overview of current limitations and outlines prospective research directions that can guide the practical deployment of quantum-enhanced analytics in large-scale data environments.
Keywords: quantum algorithms, big data, hybrid computing, optimization, quantum search, security, scalability, quantum analytics.
5 DIGITAL IDENTITY AND DISTRIBUTED LEDGERS IN E-GOVERNMENT SYSTEMS
Akhmetshin V.R., Tumashev A.G.
Abstract : Digital identity built on distributed ledger technologies (DLT) is emerging as a foundational component of next-generation e-government infrastructures. Successful implementation depends on a combination of architectural design, regulatory frameworks, and technical interoperability. This paper presents a comparative assessment of global maturity levels in DLT-based identity systems and evaluates core platform characteristics. The relevance of self-sovereign identity (SSI) is emphasized as a means to enhance user control and privacy. A methodological approach is proposed for selecting technological architectures that align performance, scalability, and compliance objectives. The findings provide practical guidance for national digital transformation strategies and public sector implementation.
Keywords: digital identity, DLT, SSI, e-government, blockchain, architecture, scalability, privacy.
6 DEVELOPMENT OF VISUAL EDITORS FOR DIGITAL MEDIA: ARCHITECTURE, WEBSITE INTEGRATION, AND ADVERTISING POTENTIAL OF INTERACTIVE CONTENT
Andreev G.
Abstract : The article analyzes the engineering and architectural foundations underpinning the development of visual editors for digital media. It examines principles of modularity, extensibility, and separation of concerns, which enable the creation of interactive content without programmer involvement. It is emphasized that such editors support the automation of multimedia content production, facilitate integration with websites via API, and ensure secure isolation of executable code. The article also examines monetization strategies that include integrating advertising formats into visual media and assesses the impact of interactive features on audience engagement metrics. It is emphasized that utilizing visual editors aids in streamlining resource usage and fostering a technology-resistant framework for digital media creation.
Keywords: visual editor, digital journalism, interactive content, user engagement, advertising, marketing.