Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2025
Year: 2025
Issue: 1
Pages: 164
86
9375
Previous issue
All issues
Next issue
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Optimization of indicator of compromise utilization in information security tasks
Information security aspects
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
14
784
Pages: 9-20
Protecting neural network models from privacy violation threats in federated learning using optimization methods
Machine learning and knowledge control systems
Bezborodov P. D.
Lavrova D. S.
5
734
Pages: 21-29
From «black box» to transparency: philosophical and methodological foundations of explainability and interpretability in artificial intelligence
Machine learning and knowledge control systems
Biryukov D. N.
Suprun A. F.
12
775
Pages: 30-42
From exploitation to protection: a deep dive into adversarial attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
13
787
Pages: 43-58
Detecting adversarial samples in intrusion detection systems using machine learning models
Machine learning and knowledge control systems
Kirillov R. B.
Kalinin M. O.
10
733
Pages: 59-68
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
Software security
Bugaev V. A.
Zhukovskii E. V.
Lyrchikov A. A.
6
715
Pages: 69-82
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
Software security
Lomako A. G.
Isaev N. E.
Menisov A. B.
Sabirov T. R.
7
715
Pages: 83-96
Multiple signatures on elliptic curve isogenies with masking and participant authentication
Applied cryptography
Kostin S. O.
Aleksandrova E. B.
2
677
Pages: 97-105
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
Applied cryptography
Shenets N. N.
Aleksandrova E. B.
Konoplev A. S.
Gololobov N. V.
6
720
Pages: 106-120
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
Network and telecommunication security
Novikov P. A.
Dichenko S. A.
Lukyanov R. V.
Polikarenkov S. V.
Martynov M. L.
7
707
Pages: 121-131
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
Network and telecommunication security
Pahomov M. A.
0
652
Pages: 132-144
Anonymization of network traffic in blockchain systems by using garlic routing
Network and telecommunication security
Skrypnikov A. K.
Krundyshev V. M.
Kalinin M. O.
4
684
Pages: 145-154
Automation of archiving for atmospheric precipitation measurement information
Technological systems, algorithmization of tasks and control objects modeling
Sikarev I. A.
Abramov V. M.
Prostakevich K. S.
Abramova A. L.
Chestnov A. I.
0
692
Pages: 155-163
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept