4, 2025 DOI: 10.30857/2786-5371.2025.4 PUBLISHED: 17.09.2025 TABLE OF CONTENTS Rudenko I. AI vs AI: Using artificial intelligence to protect data and attacks on it http://doi.org/10.30857/2786-5371.2025.4.1 11 Yasenenko V. Cloud-based digital twins: How simulations can predict failures in industry http://doi.org/10.30857/2786-5371.2025.4.2 26 Latyshev Y.-V., Vlasiuk H. Research on methods for optimising the performance of VR applications in low-bandwidth browsers http://doi.org/10.30857/2786-5371.2025.4.3 37 Myronyuk O., Baklan D., Bilousova A., Strashenko V. Development of microtextures on polymer surfaces using the transfer method from metal templates http://doi.org/10.30857/2786-5371.2025.4.4 44 Roskladka A., Postrelko Ye. Conceptual model of a web-based traffic flow management system in an urban environment based on microservice architecture http://doi.org/10.30857/2786-5371.2025.4.5 54 Tarasenko H., Saliy O., Muravskyi B., Popova M., Kuzmina G. Development of the composition and technology of an alcohol-free hand sanitiser http://doi.org/10.30857/2786-5371.2025.4.6 68