Mathematical modeling and computational methods
Mathematical modeling and computational methods for natural, biological and medical systems.
Mathematical modeling and computational methods in problems of hydro-aerodynamics, magnetohydrodynamics, plasma physics and astrophysics.
Mathematical modeling and computational methods in problems of solid and deformable body mechanics.
Mathematical modeling in the socio-economic and informational spheres.
Parallel algorithms and programs for solving time-consuming problems of modeling and forecasting complex systems and processes.
Effective algorithms and optimization methods for large problems.
Intelligent information technology.
Artificial intelligence methods for the development and analysis of information systems and processes.
Machine learning, data mining and finding hidden patterns in big data.
Intelligent methods of pattern recognition and image processing.
Intelligent technologies in robotics.
Neural network technologies in science and technology.
Bioinspired optimization methods (genetic algorithms, ant colony algorithms, swarm algorithm, etc.).
Fuzzy control and decision-making systems.
Theory and practice of software development
Distributed databases, registries and blockchain technology.
Software testing, verification and validation.
Modern software development technologies.
High-performance computing systems software.
Modern information technologies in education
IT education: methodology and methodological support.
E-learning and IT in education.
Software in Education: Digital Media and Hypermedia.
Design of educational spaces.
Assistive Information Technology Teaching.
Virtual training (approaches, stands, software).
Computer systems of learning management.
Security issues of modern infocommunication systems
Analysis of security and vulnerabilities of software (SW) infocommunication systems.
Mathematical methods and algorithms for static, dynamic and combined analysis of software to ensure its safety.
User confidentiality, personal data protection and systems for controlling access to confidential data.
Information security methods and systems, information security.
Security of software applications, methods and systems for their protection.
Cyberattacks (hacker attacks) on Web resources, and countermeasures to repel them.
Information security and privacy issues on social networks.
Information counteraction to threats of terrorism, violence and distribution of content prohibited by law on the Internet.
Ensuring the cybersecurity of telecommunication systems.
Steganographic methods of concealing information exchanges.
Security and protection of information on the "Internet of things".
Quantum algorithms, quantum hacking, photonic systems, quantum and optoinformatics.
Hardware and software security systems and design of computer security systems.