Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2023
Year: 2023
Issue: 1
Pages: 148
20
9268
Previous issue
All issues
Next issue
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY
Information security application
Pavlenko E. Yu.
3
617
Pages: 9-16
Method for detecting false information from social information services using the reality parameter
Information security application
ILINYKH Vasily A.
Desyatykh Alexander V.
Telbuh Vyacheslav V.
0
556
Pages: 17-25
Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography
Information security application
Shenets N. N.
2
596
Pages: 26-36
A method for detecting manipulation attacks on recommendation systems with collaborative filtering
Information security application
ZAGALSKII D. S.
Solovey R. S.
Dakhnovich A. D.
0
563
Pages: 37-45
Analysis of the international standard ISO 27 701 and the formation of recommendations for its use
Information security application
Morgunov V. A.
Antonov R. A.
8
587
Pages: 46-53
Forming the culture of digital security of students of higher educational institutions of shipbuilding profile
Information security application
Garkushev A. Yu.
Lipis A.V.
Suprun A. F.
Ivanova L. A.
0
570
Pages: 54-61
Detecting source code fragments similarity with machine learning algorithms
Software security
Gribkov N. A.
Ovasapyan T. D.
Moskvin D. A.
1
586
Pages: 62-71
Decimation of M-sequences as a way to obtain primitive polynomials
Applied cryptography
Kushnir D. V.
Shemyakin S. N.
0
573
Pages: 72-78
Current trends in methods of operational automation of data processing
Technological systems, algorithmization of tasks and control objects modeling
Vekshina T. V.
Bolshakov V. A.
Sikarev I. A.
Korinets E. M.
0
566
Pages: 79-87
Actual problems of automation and hydrological provision of waterways in the arctic zone
Technological systems, algorithmization of tasks and control objects modeling
Vekshina T. V.
Bolshakov V. A.
Sikarev I. A.
Korinets E. M.
0
596
Pages: 88-95
An approach to assessing the effectiveness of the functioning of a group of unmanned aerial vehicles in unpredictable situations
Technological systems, algorithmization of tasks and control objects modeling
Kurakin A. S.
0
558
Pages: 96-103
The hybrid method for evasion attacks detection in the machine learning systems
Machine learning and knowledge control systems
Ivanova O. D.
Kalinin M. O.
0
582
Pages: 104-110
DDoS attacks detection based on a modular neural network
Machine learning and knowledge control systems
Sergadeeva A. I.
Lavrova D. S.
2
583
Pages: 111-118
Protection against adversarial attacks on image recognition systems using an autoencoder
Machine learning and knowledge control systems
Grigorjeva N. M.
Platonov V. V.
3
588
Pages: 119-127
Application of machine learning methods in the problem of searching area of interest for biometric identification based on the pattern of palm veins
Machine learning and knowledge control systems
Almuhamedov A. I.
Kolomoitcev V. S.
0
572
Pages: 128-138
Criteria used to assess the quality of information security systems
Quality assessment and software systems support
Sukhov A. M.
Krupenin A. V.
Yakunin V. I.
1
575
Pages: 139-147
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept