Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 3, 2021
Year: 2021
Issue: 3
Pages: 158
2
2774
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
Identification of vulnerabilities in software for ARM processors using symbological execution
Software security
Abitov R. A.
Pavlenko E. Yu.
1
182
Pages: 9-15
Encrypted files detection algorithm
Software security
Kozachok A. V.
Kozachok A. V.
Spirin A. A.
0
207
Pages: 16-26
Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms
Software security
Kriulin A. A.
Eremeev M. A.
Nefedov V. S.
0
189
Pages: 27-33
Fake posts detection using graph neural networks
Network and telecommunication security
Izotova O. A.
Lavrova D. S.
0
183
Pages: 34-43
Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?
Applied cryptography
Kustov V. N.
Krasnov A. G.
0
198
Pages: 44-54
Blockchain in 5G networks: perfomance comparison of private and public blockchain
Applied cryptography
Fedorov I. R.
Pimenov A. V.
Panin G. A.
Bezzateev S. V.
0
186
Pages: 55-62
Using contradictions in data to search implicit failures in computer systems
Critical information infrastructure security
Grusho A. A.
Grusho N. A.
Zabezhailo M. I.
Timonina E. E.
0
181
Pages: 63-71
Research of UEFI BIOS mechanisms for access to motherboard sensors from the operating system on the platform of mass chipsets on the example of temperature and voltage sensors
Critical information infrastructure security
Pahomov M. A.
0
174
Pages: 72-82
Noisproof digitial audio watermarking in mimo audio stegosystems
Critical information infrastructure security
Gofman M. V.
0
170
Pages: 83-95
Development of a metric model of information events in the information security management system of economic activities
Critical information infrastructure security
Kirov A. D.
0
195
Pages: 96-107
An approach to detecting botnet attacks in the Internet of Things networks
Cyber-physic systems security
Tatarnikova T. M.
Sikarev I. A.
Bogdanov P. Yu.
Timochkina T. V.
0
174
Pages: 108-117
Medical cyber-physical systems attack systematization
Cyber-physic systems security
Poltavtseva M. A.
Kharitonova A. N.
1
185
Pages: 118-129
Segmenting data samples for Internet of Things devices security state analysis
Cyber-physic systems security
Sukhoparov M.E.
Lebedev I.S.
0
180
Pages: 130-136
Approaches to building situational control systems for cyberphysical systems overview
Cyber-physic systems security
Fatin A. D.
Pavlenko E. Yu.
0
183
Pages: 137-144
Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring
Cyber-physic systems security
Poltavtseva M. A.
Andreeva T. M.
0
187
Pages: 145-156
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept