Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2023
Year: 2023
Issue: 3
Pages: 186
7
2227
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach
Information security application
Glibovsky P. A.
Timashov P. V.
Chernyshov V. I.
2
172
Pages: 9-24
Improving the quality of information security state identification based on sample segmentation
Information security application
Lebedev I.S.
Sukhoparov M.E.
0
159
Pages: 25-32
Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics
Information security application
Fedosenko M.Yu.
Bezzateev S. V.
0
148
Pages: 33-57
Risk assessment of using open source projects: analysis of existing approaches
Software security
Eremeev M. A.
Zakharchuk I. I.
1
168
Pages: 58-69
Systematization of methods for finding errors in software
Software security
Samarin N.N.
0
134
Pages: 70-81
Ranking model of the system of compromise indicators of nodes of a corporate data transmission network
Network and telecommunication security
Bezzateev S. V.
Mylnikov V. A.
Starodub A. R.
0
143
Pages: 82-89
Agent-based modelling information distribution in social-information internet services
Network and telecommunication security
Biryukov D. N.
TELBUH Vyacheslav V.
Tkachenko S. F.
Kochetkov I. V.
0
149
Pages: 90-102
A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity
Network and telecommunication security
Shilova A. D.
Vorobeva A. A.
1
153
Pages: 103-116
Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats
Network and telecommunication security
Pavlenko E. Yu.
1
158
Pages: 117-125
Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation
Technological systems, algorithmization of tasks and control objects modeling
SUKHOV A. M.
KRUPENIN A. V.
YAKUNIN V. I.
Samoilenko D. V.
1
152
Pages: 126-137
Balance production models with information security
Research, monitoring and optimization of automated technological processes and productions control systems
Baryshnikov S.O.
IVANYUK V. Yu.
Sakharov V.V.
Sikarev I. A.
0
140
Pages: 138-147
Modeling of work of an employee of the information security service of an industrial enterprise
Research, monitoring and optimization of automated technological processes and productions control systems
Garkushev A. Yu.
Lipis A.V.
Karpova I.L.
Suprun A. F.
0
140
Pages: 148-153
Multi-label classification of labels of system logs of computer networks. Formalization of the task
Machine learning and knowledge control systems
Sheluhin O. I.
Rakovskiy D. I.
1
143
Pages: 154-169
Development of a trainable neural network for analysis of linguistic data
Machine learning and knowledge control systems
Grigoriev M. D.
Tatarnikova T. M.
0
138
Pages: 170-176
Creation and prospects of development of software for finding snow cover maxima from databases of meteorological archives
Machine learning and knowledge control systems
Sikarev I. A.
Chestnov A. I.
Abramov V. M.
0
130
Pages: 177-185
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept