Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2026
Year: 2026
Issue: 1
Pages: 214
153
3979
Previous issue
All issues
Submit Your Paper
XML
Latest issues
2026
,
Issue 1
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
Evaluation of signal masking by a two-component steganographic system in windowed information processing
Information security application
Belova O. A.
8
272
Pages: 9-14
A model of the process of controlling the functioning of an automated data storage and processing system under cyber attack conditions
Information security application
Russu V. Yu.
Neaskin S. R.
Biryukov D. N.
15
245
Pages: 15-30
Investigation of the confidential containers performance in fog computing for object detection tasks
Software security
Bardovsky A. A.
Fomicheva S.G.
10
252
Pages: 31-57
Forecasting multistage attacks in Kubernetes from Falco alerts using State-Space Models
Software security
Zdornikov E. O.
6
266
Pages: 58-68
Usage of the subject-object model in the task of detecting malicious software in the Android OS
Software security
Ivanov M. S.
Pavlenko E. Yu.
6
269
Pages: 69-86
Analysis of information security issues in hyperconvergent infrastructure
Network and telecommunication security
Mashkina I.V.
Dunyushkina K. S.
6
254
Pages: 87-98
Adaptive architecture for secure remote access to corporate hosting services
Network and telecommunication security
Mingazov T. R.
Kalinin M. O.
5
252
Pages: 99-108
The impact of the Shadow IT on data processing security in infrastructure of institutions: risks and solutions
Network and telecommunication security
Ponachugin A. V.
Andreeva A. D.
2
236
Pages: 109-122
Multi-level model of secure interoperability in e-commerce based on a security profile
Network and telecommunication security
Razinkin E. I.
4
264
Pages: 123-133
Error of approximation of chi-square distribution by normal distribution as a function of sample size
Applied cryptography
Kasyanov A. V.
Vitchak I. D.
13
296
Pages: 134-151
Cyber resilience of digital substations: intelligent technology for cyber threat detection and adaptive environment management
Cyber-physic systems security
Zegzhda D. P.
Gavva G. D.
Kalinin M. O.
Ovasapyan T. D.
Tolstykh M. A.
11
288
Pages: 152-167
Automation of water transport activities using factorial approach to risk managemen
Cyber-physic systems security
Sikarev I. A.
Abramova A. L.
Prostakevich K. S.
Semidelova A.O.
Abramov V. M.
2
234
Pages: 168-175
Identification of a person in uniform based on video stream data using the YOLO convolutional neural network
Machine learning and knowledge control systems
Kornienko A. A.
Kornienko S. V.
Nikitin A. B.
Orlov V. A.
5
267
Pages: 176-186
Automation of information security incident detection using custom correlation rules in a SIEM system
Machine learning and knowledge control systems
Sadykov A. M.
Alekseeva A.A.
7
315
Pages: 187-200
Use of large language models for security event analysis
Machine learning and knowledge control systems
Tumakov M. D.
Ivanova L. A.
5
269
Pages: 201-213
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept