Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 4, 2023
Year: 2023
Issue: 4
Pages: 191
8
2104
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Substantiation of the rational composition of the information security system
Information security aspects
Zegzhda D. P.
Anisimov Vladimir G.
Suprun A. F.
Anisimov E. G.
0
141
Pages: 9-18
Analysis of cyber threat intelligence information exchange systems
Information security application
Pavlenko E. Yu.
Polosukhin N. V.
0
140
Pages: 19-30
Combinational coding of data taking into account the analysis of the value of the information contained
Information security application
CHECHIN I.V.
Marinin A. A.
Novikov P. A.
Dichenko S. A.
Samoilenko D. V.
1
133
Pages: 31-41
Method of embedding hidden data in message stream with error-correcting coding
Information security application
BELIM S.V.
Gorshkov S. A.
1
149
Pages: 42-47
A method of responding to targeted attacks based on the mapping of information security events using indication signatures
Information security application
Andrushkevich D. V.
Andrushkevich S. S.
Kryukov R. O.
4
150
Pages: 48-60
Risk assessment of the use of open source projects: a method for analyzing metrics of the development process
Software security
Eremeev M. A.
Zakharchuk I. I.
0
129
Pages: 61-71
Malware detection using deep neural networks
Software security
Volkovskiy M. A.
Ovasapyan T. D.
Makarov A. S.
0
148
Pages: 72-83
Attack detection by artificial neural networks
Network and telecommunication security
Tatarnikova T. M.
Sikarev I. A.
0
145
Pages: 84-94
Method for ensuring data integrity in edge computing networks based on blockchain technology
Network and telecommunication security
Kovalev A. A.
Fedorov I. R.
0
150
Pages: 95-104
Decentralized messaging systems threat model
Network and telecommunication security
Anoshkin I. A.
Orel E.M.
Moskvin D. A.
0
148
Pages: 105-115
Oblivious signature scheme based on isogenies of supersingular elliptic curves
Applied cryptography
Khutsaeva A. F.
Davydov V. V.
Bezzateev S. V.
1
134
Pages: 116-121
Data modeling in information security of polystorages
Technological systems, algorithmization of tasks and control objects modeling
Poltavtseva M. A.
Kalinin M. O.
Zegzhda D. P.
0
132
Pages: 122-132
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
Machine learning and knowledge control systems
RUCHKIN V.N.
FULIN V.A.
Ruchkina E. V.
Grigorenko D. V.
0
131
Pages: 133-144
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
Machine learning and knowledge control systems
Yugai P. E.
Moskvin D. A.
0
130
Pages: 145-155
Adversarial attacks against a machine learning based intrusion detection system
Machine learning and knowledge control systems
Getman A. I.
Goryunov M. N.
Matskevich A. G.
Rybolovlev D. A.
Nikolskaya A. G.
1
144
Pages: 156-190
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept