Search
POISCS
Problems of information security. Computer systems
Peter the Great St. Petersburg Polytechnic University
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 4, 2022
Year: 2022
Issue: 4
Pages: 110
7
3411
Previous issue
All issues
Next issue
Submit Your Paper
XML
Publication schedule
№1 March 2026
Latest issues
2025
,
Issue 4
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
EVALUATION OF THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM
Information security aspects
Zegzhda D. P.
Saurenko T. N.
Anisimov Vladimir G.
Anisimov E. G.
1
345
Pages: 9-19
SECURITY OF A TWO-COMPONENT STEGANOGRAPHIC SYSTEM TO UNAUTHORIZED INFORMATION EXTRACTION
Information security aspects
SHAKURSKIY M. V,
KARAULOVA O. A.
KARTASHEVSKAYA E.S.
0
354
Pages: 20-27
METHODOLOGY OF EARLY DETECTION OF DDOS ATTACKS TO PROTECT INFORMATION INFRASTRUCTURE OBJECTS
Information security application
Glibovsky P. A.
Timashov P. V.
KOTENOK I.A.
1
351
Pages: 28-34
CLUSTERING OF COMPUTER NETWORKS BASED ON THE BEE COLONY ALGORITHM
Information security application
Eremenko I.S.
Fatin A. D.
Pavlenko E. Yu.
1
321
Pages: 35-42
IDENTIFYING AND COUNTERING MALICIOUS INFORMATION IN SOCIAL NETWORKS
Information security application
Glibovsky P. A.
Serebryakov P.N.
Timashov P. V.
2
346
Pages: 43-52
IMITATIONAL SOFTWARE PACKAGE FOR RESEARCHING HIGHLY DETECTABLE STEGOSYSTEMS — HUGO SYSTEMS
Information security application
Krasnov A. G.
1
328
Pages: 53-63
FINDING ENUMERATORS FOR A GENERALIZED (L, G)-CODE
Applied cryptography
NOSKOV I.K.
Bezzateev S. V.
0
320
Pages: 64-70
IMPROVING THE EFFICIENCY OF MULTI-AGENT INFORMATION SECURITY SYSTEMS USING POST-QUANTUM CRYPTOGRAPHY
Applied cryptography
Bezzateev S. V.
Fomicheva S.G.
Suprun A. F.
0
352
Pages: 71-88
ADAPTIVE NEUTRALIZATION OF CYBERPHYSICAL SYSTEMS STRUCTURAL BREACH BASE ON GRAPH ARTOFOCAL NEURAL NETWORKS
Information security cyber-physic systems
Aleksandrova E. B.
Shtyrkina A. A.
1
352
Pages: 89-100
ASPECTS OF THE DEVELOPMENT AND FUTURE PROSPECTS OF THE PROGRAM FOR AUTOMATIC PROCESSING OF SATELLITE ARCHIVES OF HYDROCHEMICAL DATA IN THE PYTHON PROGRAMMING LANGUAGE
Technological systems, algorithmization of tasks and control objects modeling
Sikarev I. A.
Chestnov A. I.
Abramov V. M.
0
342
Pages: 101-109
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept