Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2026
Year: 2026
Issue: 1
Pages: 214
21
222
Previous issue
All issues
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Evaluation of signal masking by a two-component steganographic system in windowed information processing
Information security application
Belova O. A.
0
14
Pages: 9-14
A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions
Information security application
Russu V. Yu.
Neaskin S. R.
Biryukov D. N.
1
21
Pages: 15-30
Investigation of the confidential containers performance in fog computing for object detection tasks
Software security
Bardovsky A. A.
Fomicheva S.G.
2
15
Pages: 31-57
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
Software security
Zdornikov E. O.
0
15
Pages: 58-68
Usage of the subject-object model in the task of detecting malicious software in the Android OS
Software security
Ivanov M. S.
Pavlenko E. Yu.
0
18
Pages: 69-86
Analysis of information security issues in hyperconvergent infrastructure
Network and telecommunication security
Mashkina I.V.
Dunyushkina K. S.
0
15
Pages: 87-98
Adaptive architecture for secure remote access to corporate hosting services
Network and telecommunication security
Mingazov T. R.
Kalinin M. O.
1
15
Pages: 99-108
The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions
Network and telecommunication security
Ponachugin A. V.
Andreeva A. D.
0
13
Pages: 109-122
Multi-level model of secure interoperability in e-commerce based on a security profile
Network and telecommunication security
Razinkin E. I.
0
13
Pages: 123-133
Error of approximation of chi-square distribution by normal distribution as a function of sample size
Applied cryptography
Kasyanov A. V.
Vitchak I. D.
1
15
Pages: 134-151
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
Cyber-physic systems security
Zegzhda D. P.
Gavva G. D.
Kalinin M. O.
Ovasapyan T. D.
Tolstykh M. A.
0
16
Pages: 152-167
Automation of water transport activities using factorial approach to risk managemen
Cyber-physic systems security
Sikarev I. A.
Abramova A. L.
Prostakevich K. S.
Semidelova A.O.
Abramov V. M.
1
16
Pages: 168-175
Identification of a person in uniform based on video stream data using the YOLO convolutional neural network
Machine learning and knowledge control systems
Kornienko A. A.
Kornienko S. V.
Nikitin A. B.
Orlov V. A.
0
12
Pages: 176-186
Automation of information security incident detection using custom correlation rules in a SIEM system
Machine learning and knowledge control systems
Sadykov A. M.
Alekseeva A.A.
0
11
Pages: 187-200
Use of large language models for security event analysis
Machine learning and knowledge control systems
Tumakov M. D.
Ivanova L. A.
1
13
Pages: 201-213
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept