Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 2, 2023
Year: 2023
Issue: 2
Pages: 212
10
4470
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Evaluation of signal masking by a two-component steganographic system in windowed information processing
Information security application
SHAKURSKIY M. V,
KARAULOVA O. A.
2
417
Pages: 9-16
Using botnet coordination detection to detect social information campaigns
Information security application
LOGINOV Z. G.
Solovey R. S.
Dakhnovich A. D.
1
419
Pages: 17-26
Accounting for the impact of the human factor in cyber security models
Information security application
Karpova I.L.
KURILOV A. V.
Suprun A. F.
Ivanova L. A.
1
438
Pages: 27-36
Aspects of detecting malicious installation files using machine learning algorithms
Software security
Yugai P. E.
Zhukovskii E. V.
Semenov P. O.
0
423
Pages: 37-46
Analysis of decompiled program code using abstract syntax trees
Software security
Gribkov N. A.
Ovasapyan T. D.
Moskvin D. A.
2
194
Pages: 47-60
Methods of monitoring the execution of the security pattern in infocommunication systems
Network and telecommunication security
KOLOMOITCEV V. S.
0
198
Pages: 61-72
Decentralized messaging systems architecture stability analysis
Network and telecommunication security
Orel E.M.
Moskvin D. A.
Anoshkin I. A.
0
238
Pages: 73-81
Bitcoin Core cryptocurrency wallet cryptographic security analysis
Applied cryptography
Semyanov P. V.
Grezina S. V.
4
246
Pages: 82-91
Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities
Critical information infrastructure security
Vasinev D. A.
Semenov A. K.
0
201
Pages: 92-106
Cyber resiliency support based on methods of graph analysis and functional network virtualization
Cyber-physic systems security
Zavadskii E. V.
Kalinin M. O.
0
192
Pages: 107-122
A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity
Cyber-physic systems security
Bogina V. M.
Lavrova D. S.
Zegzhda D. P.
Pavlenko E. Yu.
0
186
Pages: 123-139
Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things
Cyber-physic systems security
Markov G.A.
0
189
Pages: 140-149
Cybersecurity assessment of cyber-physical system based on analysis of malware signatures
Cyber-physic systems security
Zegzhda D. P.
Zubkov E. A.
Moskvin D. A.
0
190
Pages: 150-162
Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory
Cyber-physic systems security
Markov G.A.
Krundyshev V. M.
Kalinin M. O.
Zegzhda D. P.
Busygin A. G.
0
185
Pages: 163-172
Method of cyberphysical system topology reconfiguration based on graph artificial neural network
Cyber-physic systems security
Shtyrkina A. A.
0
188
Pages: 173-182
Approaches to solving the problem of synthesis of an effective process of functioning of military-technical systems
Technological systems, algorithmization of tasks and control objects modeling
SUKHOV A. M.
0
185
Pages: 183-190
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
Machine learning and knowledge control systems
Milyakov D. F.
Sikarev I. A.
Travin S. V.
0
191
Pages: 191-201
Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication
Machine learning and knowledge control systems
Kalinin M. O.
Tkacheva E. I.
0
190
Pages: 202-211
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept