Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2022
Year: 2022
Issue: 1
Pages: 133
10
2436
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS
Information security aspects
Anisimov Vladimir G.
Anisimov E. G.
Saurenko T. N.
LOS Vladimir P.
0
221
Pages: 11-17
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
Information security application
Poltavtsev A. A
0
217
Pages: 18-31
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T'S MITRE KNOWLEDGE BASE
Software security
Kriulin A. A.
Eremeev M. A.
POTERPEEV German Yu.
5
227
Pages: 32-40
IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS
Network and telecommunication security
Fatin A. D.
Pavlenko E. Yu.
1
209
Pages: 41-50
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
Network and telecommunication security
Tatarnikova T. M.
SVERLIKOV Alexander V.
Sikarev I. A.
1
225
Pages: 51-57
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
Applied cryptography
STARIKOV Timofey V.
SOPIN Kirill Yu.
Dichenko S. A.
SAMOILENKO Dmitry V.
0
206
Pages: 58-67
METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR PHOTOGRAPHIC IMAGES
Applied cryptography
Vilkhovsky D. E.
0
190
Pages: 68-76
SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES
Applied cryptography
SOKOLOV Alexander S.
CHERNOV Andrey Yu.
Konoplev A. S.
0
191
Pages: 77-84
CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED ON GEOMETRIC FRACTALS
Applied cryptography
SOPIN Kirill Yu.
Dichenko S. A.
SAMOILENKO Dmitry V.
0
177
Pages: 85-95
SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS USING DEEP LEARNING METHODS
Cyber-physic systems security
DANILOV Vladislav D.
Ovasapyan T. D.
Ivanov D. V.
Konoplev A. S.
2
198
Pages: 96-109
METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING OF THE INFORMATION SECURITY SYSTEM
Technological systems, algorithmization of tasks and control objects modeling
SUKHOV A. M.
KRUPENIN A. V.
YAKUNIN V. I.
0
189
Pages: 110-120
PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING
Technological systems, algorithmization of tasks and control objects modeling
Garkushev A. Yu.
Suprun A. F.
SYSUEV Sergey Yu.
1
186
Pages: 121-131
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept