Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2025
Year: 2025
Issue: 1
Pages: 164
48
3738
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Optimization of indicator of compromise utilization in information security tasks
Information security aspects
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
6
308
Pages: 9-20
Protecting neural network models from privacy violation threats in federated learning using optimization methods
Machine learning and knowledge control systems
Bezborodov P. D.
Lavrova D. S.
2
307
Pages: 21-29
From «black box» to transparency: philosophical and methodological foundations of explainability and interpretability in artificial intelligence
Machine learning and knowledge control systems
Biryukov D. N.
Suprun A. F.
4
302
Pages: 30-42
From exploitation to protection: a deep dive into adversarial attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
6
315
Pages: 43-58
Detecting adversarial samples in intrusion detection systems using machine learning models
Machine learning and knowledge control systems
Kirillov R. B.
Kalinin M. O.
7
297
Pages: 59-68
Detection of potentially malicious activity in CI/CD pipelines based on analysis of runner behavior
Software security
Bugaev V. A.
Zhukovskii E. V.
Lyrchikov A. A.
6
302
Pages: 69-82
An approach to identifying software code vulnerabilities based on adaptation with reinforcement learning of machine learning models
Software security
Lomako A. G.
Isaev N. E.
Menisov A. B.
Sabirov T. R.
5
281
Pages: 83-96
Multiple signatures on elliptic curve isogenies with masking and participant authentication
Applied cryptography
Kostin S. O.
Aleksandrova E. B.
2
262
Pages: 97-105
General solution to the special problem of distributing shares using Shamir’s secret sharing scheme
Applied cryptography
Shenets N. N.
Aleksandrova E. B.
Konoplev A. S.
Gololobov N. V.
4
273
Pages: 106-120
A mathematical model and methodology for evaluating the effectiveness of network monitoring of data transmission network security
Network and telecommunication security
Novikov P. A.
Dichenko S. A.
Lukyanov R. V.
Polikarenkov S. V.
Martynov M. L.
4
300
Pages: 121-131
Model of node interaction in a mobile ad-hoc network considering protection against active network attacks
Network and telecommunication security
Pahomov M. A.
0
261
Pages: 132-144
Anonymization of network traffic in blockchain systems by using garlic routing
Network and telecommunication security
Skrypnikov A. K.
Krundyshev V. M.
Kalinin M. O.
2
263
Pages: 145-154
Automation of archiving for atmospheric precipitation measurement information
Technological systems, algorithmization of tasks and control objects modeling
Sikarev I. A.
Abramov V. M.
Prostakevich K. S.
Abramova A. L.
Chestnov A. I.
0
267
Pages: 155-163
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept