Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2025
Year: 2025
Issue: 3
Pages: 213
139
4852
Previous issue
All issues
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Fuzzing of closed-source software using large language models
Software security
Gavrichkov D. A.
Ovasapyan T. D.
Ivanov D. V.
30
398
Pages: 9-19
Generalized method for comparative analysis of fuzz testing tools
Software security
Ognev R. A.
Zegzhda D. P.
11
318
Pages: 20-29
Analysis of methods for detecting malicious software using large language models and eBPF technology
Software security
Pavlenko E. Yu.
Ivanov M. S.
8
362
Pages: 30-39
A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method
Network and telecommunication security
Gofman M. V.
Kornienko A. A.
4
293
Pages: 40-54
Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task
Network and telecommunication security
Zhukov I. Yu.
Balashova E. E.
Mandrov A. P.
Kravchenko N. D.
3
321
Pages: 55-68
Optimization of computer incident investigation algorithm in SIEM systems
Network and telecommunication security
Chizhevsky M. A.
Serpeninov O. V.
Lapsar A. P.
5
305
Pages: 69-80
Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model
Critical information infrastructure security
Vasiliev O. S.
Krundyshev V. M.
Kalinin M. O.
5
295
Pages: 81-90
Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes
Critical information infrastructure security
Zavadskii E. V.
6
294
Pages: 91-99
Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms
Critical information infrastructure security
Kurakin A. S.
1
290
Pages: 100-109
From exploitation to protection: analysis of methods for defending against attacks on LLMS
Machine learning and knowledge control systems
Velichko I. S.
Bezzateev S. V.
11
334
Pages: 110-120
Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences
Machine learning and knowledge control systems
Spirin A. A.
Ikonnikov A. V.
Matuhina E. N.
5
314
Pages: 121-146
Research of adversarial attacks on classical machine learning models in the context of network threat detection
Machine learning and knowledge control systems
Yugai P. E.
12
349
Pages: 147-164
Optimization of data obfuscation in big data processing and storage systems
Applied cryptography
Poltavtseva M. A.
2
292
Pages: 165-179
On the question of the applicability of the statistics of the measure «chi-square» in the problem of determining the parameters of block encryption algorithms
Applied cryptography
Mironkin V. O.
Yurasov N. A.
13
318
Pages: 180-191
Global practices in regulating and implementing generative artificial intelligence in higher education
Specialist training
Biryukov D. N.
Suprun A. F.
Biryukova A. D.
23
369
Pages: 192-212
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept