Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2025
Year: 2025
Issue: 3
Pages: 213
190
8772
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Fuzzing of closed-source software using large language models
Software security
Gavrichkov D. A.
Ovasapyan T. D.
Ivanov D. V.
41
701
Pages: 9-19
Generalized method for comparative analysis of fuzz testing tools
Software security
Ognev R. A.
Zegzhda D. P.
17
566
Pages: 20-29
Analysis of methods for detecting malicious software using large language models and eBPF technology
Software security
Pavlenko E. Yu.
Ivanov M. S.
15
664
Pages: 30-39
A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method
Network and telecommunication security
Gofman M. V.
Kornienko A. A.
4
550
Pages: 40-54
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
Network and telecommunication security
Zhukov I. Yu.
Balashova E. E.
Mandrov A. P.
Kravchenko N. D.
6
574
Pages: 55-68
Optimization of computer incident investigation algorithm in SIEM systems
Network and telecommunication security
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
5
552
Pages: 69-80
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
Critical information infrastructure security
Vasiliev O. S.
Krundyshev V. M.
Kalinin M. O.
6
534
Pages: 81-90
Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes
Critical information infrastructure security
Zavadskii E. V.
7
537
Pages: 91-99
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
Critical information infrastructure security
Kurakin A. S.
3
535
Pages: 100-109
From exploitation to protection: analysis of methods for defending against attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
18
605
Pages: 110-120
Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences
Machine learning and knowledge control systems
Spirin A. A.
Ikonnikov A. V.
Matuhina E. N.
6
565
Pages: 121-146
Research of adversarial attacks on classical machine learning models in the context of network threat detection
Machine learning and knowledge control systems
Yugai P. E.
19
612
Pages: 147-164
Optimization of data obfuscation in big data processing and storage systems
Applied cryptography
Poltavtseva M. A.
2
546
Pages: 165-179
On the question of the applicability of the statistics of the measure «chi-square» in the problem of determining the parameters of block encryption algorithms
Applied cryptography
Mironkin V. O.
Yurasov N. A.
13
568
Pages: 180-191
Global practices in regulating and implementing generative artificial intelligence in higher education
Specialist training
Biryukov D. N.
Suprun A. F.
Biryukova A. D.
28
663
Pages: 192-212
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept