Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2021
Year: 2021
Issue: 1
Pages: 134
8
4658
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Data structures formation in active security monitoring tasks
Information security application
Poltavtseva M. A.
1
322
Pages: 9-19
Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks
Network and telecommunication security
Ageev S. A.
Ageeva N. S.
Karetnikov V. V.
Privalov A. A.
Sikarev I. A.
1
314
Pages: 20-30
Dynamic phishing website dataset collection
Network and telecommunication security
Kubrin G. S.
Ivanov D. V.
0
340
Pages: 31-38
Analysis of ultra-high volumes of network traffic based on quantum machine learning
Network and telecommunication security
Kalinin M. O.
Krundyshev V. M.
0
321
Pages: 39-49
Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms
Network and telecommunication security
Marshev I. I.
Zhukovskii E. V.
Aleksandrova E. B.
1
365
Pages: 50-54
Approach to detect maliscous servers on anonimous network TOR based on clasterization methods
Network and telecommunication security
Nefedov V. S.
Kriulin A. A.
Eremeev M. A.
3
334
Pages: 55-61
Detection of network attacks in software-defined networks using isolating forest algorithm
Network and telecommunication security
Stepanov M. D.
Pavlenko E. Yu.
Lavrova D. S.
0
320
Pages: 62-78
Countering information threats using honeypot systems based on graph of potential attacks
Network and telecommunication security
Zavadskii E. V.
Ivanov D. V.
0
329
Pages: 79-85
New regular sliding window algorithms for elliptic curve scalar point multiplication
Applied cryptography
Shenets N. N.
Petushkov A. S.
1
332
Pages: 86-95
Efficiency of computer network functioning in conditions of malicious information influences
Special IT
Zegzhda D. P.
Anisimov Vladimir G.
Anisimov E. G.
Saurenko T. N.
1
318
Pages: 96-101
Conceptual model of geoinformation system adaptive control under conditions of destabilization
Special IT
Gryzunov V.V.
0
356
Pages: 102-108
Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things
Information security cyber-physic systems
Fatin A. D.
Pavlenko E. Yu.
0
329
Pages: 109-116
Anomaly detection in cyber-physical systems using graph neural networks
Information security cyber-physic systems
Vasileva K.V.
Lavrova D. S.
0
374
Pages: 117-130
Security through obscurity in industrial Internet of Things
Information security cyber-physic systems
Dakhnovich A. D.
Moskvin D. A.
Zegzhda D. P.
0
304
Pages: 131-137
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept