Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 2, 2021
Year: 2021
Issue: 2
Pages: 152
10
1281
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
Integrity control of KVM-based virtual machines components on OpenStack platform
Secure operating systems and trusted environment
Stasyev D. O.
0
84
Pages: 9-20
Anomaly detection in cyber-physical systems using graph neural networks
Network and telecommunication security
Ivanov M. I.
Pavlenko E. Yu.
1
86
Pages: 21-40
Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident
Network and telecommunication security
Smirnov S. I.
Eremeev M. A.
Pribylov I. A.
1
79
Pages: 41-47
Adversarial attacks on intrusion detection systems using LSTM classifier
Network and telecommunication security
Kulikov D. A.
Platonov V. V.
0
79
Pages: 48-56
Implementation of honeypot systems based on potential attack graph
Network and telecommunication security
Zavadskii E. V.
Ivanov D. V.
1
78
Pages: 57-64
Security threat model of network domain name service when implementing attacking scenarios
Network and telecommunication security
Danilov V. V.
Ovcharov V. A.
0
78
Pages: 65-73
Development of phishing site classificators based on dynamicaly updated dataset
Network and telecommunication security
Kubrin G. S.
Ivanov D. V.
0
74
Pages: 74-81
Authentication of intelligent electronic devices in IoT network with the edge computing architecture
Applied cryptography
Aleksandrova E. B.
Oblogina A. Yu.
Shkorkina E. N.
3
84
Pages: 82-88
Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems
Applied cryptography
Kustov V. N.
Krasnov A. G.
0
80
Pages: 89-96
Multi-dimensional data integrity control model
Special IT
Dichenko S. A.
1
95
Pages: 97-103
Protection against HID attacks
Special IT
Tatarnikova T. M.
Verevkin S. A.
Kraeva E. V.
0
77
Pages: 104-108
Model for forming development program of organization’s information security system
Special IT
ZEGZHDA PD
Zegzhda D. P.
Anisimov Vladimir G.
Anisimov E. G.
Saurenko T. N.
2
94
Pages: 109-117
Detection malware based on clusterization of performed actions
Software security
Ognev R. A.
Zhukovskii E. V.
Zegzhda D. P.
1
73
Pages: 118-126
IoT devices analysis using neural networks ensemble trained on unbalanced sample
Information security cyber-physic systems
Sukhoparov M.E.
Lebedev I.S.
0
74
Pages: 127-134
Application of Honeypot technology with adaptive behavior for IoT networks
Information security cyber-physic systems
Ovasapyan T. D.
Nikulkin V. A.
Moskvin D. A.
0
77
Pages: 135-144
Cyber-physical systems sustainability based on graph theory
Information security cyber-physic systems
Shtyrkina A. A.
0
69
Pages: 145-150
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept