Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 4, 2023
Year: 2023
Issue: 4
Pages: 191
35
5479
Previous issue
All issues
Next issue
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Substantiation of the rational composition of the information security system
Information security aspects
Zegzhda D. P.
Anisimov Vladimir G.
Suprun A. F.
Anisimov E. G.
0
349
Pages: 9-18
Analysis of cyber threat intelligence information exchange systems
Information security application
Pavlenko E. Yu.
Polosukhin N. V.
1
347
Pages: 19-30
Combinational coding of data taking into account the analysis of the value of the information contained
Information security application
CHECHIN I.V.
Marinin A. A.
Novikov P. A.
Dichenko S. A.
Samoilenko D. V.
2
348
Pages: 31-41
Method of embedding hidden data in message stream with error-correcting coding
Information security application
BELIM S.V.
Gorshkov S. A.
2
378
Pages: 42-47
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
Information security application
Andrushkevich D. V.
Andrushkevich S. S.
Kryukov R. O.
13
397
Pages: 48-60
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
Software security
Eremeev M. A.
Zakharchuk I. I.
2
353
Pages: 61-71
Malware detection using deep neural networks
Software security
Volkovskiy M. A.
Ovasapyan T. D.
Makarov A. S.
3
385
Pages: 72-83
Attack detection by artificial neural networks
Network and telecommunication security
Tatarnikova T. M.
Sikarev I. A.
1
377
Pages: 84-94
Method for ensuring data integrity in edge computing networks based on blockchain technology
Network and telecommunication security
Kovalev A. A.
Fedorov I. R.
2
369
Pages: 95-104
Decentralized messaging systems threat model
Network and telecommunication security
Anoshkin I. A.
Orel E.M.
Moskvin D. A.
0
357
Pages: 105-115
Oblivious signature scheme based on isogenies of supersingular elliptic curves
Applied cryptography
Khutsaeva A. F.
Davydov V. V.
Bezzateev S. V.
5
363
Pages: 116-121
Data modeling in information security of polystorages
Technological systems, algorithmization of tasks and control objects modeling
Poltavtseva M. A.
Kalinin M. O.
Zegzhda D. P.
1
356
Pages: 122-132
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
Machine learning and knowledge control systems
RUCHKIN V.N.
FULIN V.A.
Ruchkina E. V.
Grigorenko D. V.
0
340
Pages: 133-144
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
Machine learning and knowledge control systems
Yugai P. E.
Moskvin D. A.
0
345
Pages: 145-155
Adversarial attacks against a machine learning based intrusion detection system
Machine learning and knowledge control systems
Getman A. I.
Goryunov M. N.
Matskevich A. G.
Rybolovlev D. A.
Nikolskaya A. G.
3
415
Pages: 156-190
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept