Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 2, 2021
Year: 2021
Issue: 2
Pages: 152
17
5285
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Integrity control of KVM-based virtual machines components on OpenStack platform
Secure operating systems and trusted environment
Stasyev D. O.
0
352
Pages: 9-20
Anomaly detection in cyber-physical systems using graph neural networks
Network and telecommunication security
Ivanov M. I.
Pavlenko E. Yu.
2
352
Pages: 21-40
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
Network and telecommunication security
Smirnov S. I.
Eremeev M. A.
Pribylov I. A.
2
338
Pages: 41-47
Adversarial attacks on intrusion detection systems using LSTM classifier
Network and telecommunication security
Kulikov D. A.
Platonov V. V.
0
338
Pages: 48-56
Implementation of honeypot systems based on potential attack graph
Network and telecommunication security
Zavadskii E. V.
Ivanov D. V.
1
346
Pages: 57-64
Security threat model of network domain name service when implementing attacking scenarios
Network and telecommunication security
Danilov V. V.
Ovcharov V. A.
0
339
Pages: 65-73
Development of phishing site classificators based on dynamicaly updated dataset
Network and telecommunication security
Kubrin G. S.
Ivanov D. V.
0
296
Pages: 74-81
Authentication of intelligent electronic devices in IoT network with the edge computing architecture
Applied cryptography
Aleksandrova E. B.
Oblogina A. Yu.
Shkorkina E. N.
3
326
Pages: 82-88
Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems
Applied cryptography
Kustov V. N.
Krasnov A. G.
0
304
Pages: 89-96
Multi-dimensional data integrity control model
Special IT
Dichenko S. A.
1
354
Pages: 97-103
Protection against HID attacks
Special IT
Tatarnikova T. M.
Verevkin S. A.
Kraeva E. V.
2
349
Pages: 104-108
Model for forming development program of organization’s information security system
Special IT
ZEGZHDA PD
Zegzhda D. P.
Anisimov Vladimir G.
Anisimov E. G.
Saurenko T. N.
5
344
Pages: 109-117
Detection malware based on clusterization of performed actions
Software security
Ognev R. A.
Zhukovskii E. V.
Zegzhda D. P.
1
296
Pages: 118-126
IoT devices analysis using neural networks ensemble trained on unbalanced sample
Information security cyber-physic systems
Sukhoparov M.E.
Lebedev I.S.
0
331
Pages: 127-134
Application of Honeypot technology with adaptive behavior for IoT networks
Information security cyber-physic systems
Ovasapyan T. D.
Nikulkin V. A.
Moskvin D. A.
0
326
Pages: 135-144
Cyber-physical systems sustainability based on graph theory
Information security cyber-physic systems
Shtyrkina A. A.
0
294
Pages: 145-150
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept