Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2025
Year: 2025
Issue: 3
Pages: 213
231
11670
Previous issue
All issues
Next issue
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Fuzzing of closed-source software using large language models
Software security
Gavrichkov D. A.
Ovasapyan T. D.
Ivanov D. V.
47
895
Pages: 9-19
Generalized method for comparative analysis of fuzz testing tools
Software security
Ognev R. A.
Zegzhda D. P.
19
766
Pages: 20-29
Analysis of methods for detecting malicious software using large language models and eBPF technology
Software security
Pavlenko E. Yu.
Ivanov M. S.
21
857
Pages: 30-39
A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method
Network and telecommunication security
Gofman M. V.
Kornienko A. A.
7
754
Pages: 40-54
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
Network and telecommunication security
Zhukov I. Yu.
Balashova E. E.
Mandrov A. P.
Kravchenko N. D.
7
762
Pages: 55-68
Optimization of computer incident investigation algorithm in SIEM systems
Network and telecommunication security
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
8
766
Pages: 69-80
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
Critical information infrastructure security
Vasiliev O. S.
Krundyshev V. M.
Kalinin M. O.
8
697
Pages: 81-90
Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes
Critical information infrastructure security
Zavadskii E. V.
7
712
Pages: 91-99
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
Critical information infrastructure security
Kurakin A. S.
3
708
Pages: 100-109
From exploitation to protection: analysis of methods for defending against attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
23
824
Pages: 110-120
Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences
Machine learning and knowledge control systems
Spirin A. A.
Ikonnikov A. V.
Matuhina E. N.
8
774
Pages: 121-146
Research of adversarial attacks on classical machine learning models in the context of network threat detection
Machine learning and knowledge control systems
Yugai P. E.
24
799
Pages: 147-164
Optimization of data obfuscation in big data processing and storage systems
Applied cryptography
Poltavtseva M. A.
2
709
Pages: 165-179
On the question of the applicability of the statistics of the measure «chi-square» in the problem of determining the parameters of block encryption algorithms
Applied cryptography
Mironkin V. O.
Yurasov N. A.
15
751
Pages: 180-191
Global practices in regulating and implementing generative artificial intelligence in higher education
Specialist training
Biryukov D. N.
Suprun A. F.
Biryukova A. D.
32
896
Pages: 192-212
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept