Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2021
Year: 2021
Issue: 1
Pages: 134
2
1222
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Data structures formation in active security monitoring tasks
Information security application
Poltavtseva M. A.
1
82
Pages: 9-19
Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks
Network and telecommunication security
Ageev S. A.
Ageeva N. S.
Karetnikov V. V.
Privalov A. A.
Sikarev I. A.
0
80
Pages: 20-30
Dynamic phishing website dataset collection
Network and telecommunication security
Kubrin G. S.
Ivanov D. V.
0
86
Pages: 31-38
Analysis of ultra-high volumes of network traffic based on quantum machine learning
Network and telecommunication security
Kalinin M. O.
Krundyshev V. M.
0
85
Pages: 39-49
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
Network and telecommunication security
Marshev I. I.
Zhukovskii E. V.
Aleksandrova E. B.
0
91
Pages: 50-54
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
Network and telecommunication security
Nefedov V. S.
Kriulin A. A.
Eremeev M. A.
0
81
Pages: 55-61
Detection of network attacks in software-defined networks using isolating forest algorithm
Network and telecommunication security
Stepanov M. D.
Pavlenko E. Yu.
Lavrova D. S.
0
86
Pages: 62-78
Countering information threats using honeypot systems based on graph of potential attacks
Network and telecommunication security
Zavadskii E. V.
Ivanov D. V.
0
82
Pages: 79-85
New regular sliding window algorithms for elliptic curve scalar point multiplication
Applied cryptography
Shenets N. N.
Petushkov A. S.
1
85
Pages: 86-95
Efficiency of computer network functioning in conditions of malicious information influences
Special IT
Zegzhda D. P.
Anisimov Vladimir G.
Anisimov E. G.
Saurenko T. N.
0
84
Pages: 96-101
Conceptual model of geoinformation system adaptive control under conditions of destabilization
Special IT
Gryzunov V.V.
0
124
Pages: 102-108
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
Information security cyber-physic systems
Fatin A. D.
Pavlenko E. Yu.
0
86
Pages: 109-116
Anomaly detection in cyber-physical systems using graph neural networks
Information security cyber-physic systems
Vasileva K.V.
Lavrova D. S.
0
93
Pages: 117-130
Security through obscurity in industrial Internet of Things
Information security cyber-physic systems
Dakhnovich A. D.
Moskvin D. A.
Zegzhda D. P.
0
77
Pages: 131-137
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept