<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>1</number>
    <altNumber> </altNumber>
    <dateUni>2023</dateUni>
    <pages>1-148</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-16</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">ARTIFICIAL IMMUNIZATION OF TECHNICAL SYSTEMS TO ENSURE THEIR CYBERSECURITY</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The purpose of the study is to formally formulate the problem of artificial immunization of complex technical systems to ensure their security against cyber threats. The work draws an analogy between human immunity and the security functions of modern technical systems.&#13;
A mathematical model of a technical system that describes how the system’s immunity counteracts various cyberattacks was developed. The immunization problem is formulated to minimize the number of infected objects in the system and maximize the number of cured objects among the infected ones.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/xv9m-8nxb-f89k</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>immunization</keyword>
            <keyword>innate immunity</keyword>
            <keyword>adaptive immunity</keyword>
            <keyword>cyber-attack</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.1/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>17-25</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>ILINYKH</surname>
              <initials>Vasily</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Desyatykh</surname>
              <initials>Alexander</initials>
              <email>alecdes@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Telbuh</surname>
              <initials>Vyacheslav</initials>
              <email>telbuh89@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method for detecting false information from social information services using the reality parameter</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Currently, social information services (SIS) have become one of the important sources of information and allow any user to distribute information without restrictions, which makes it difficult to determine the degree of reliability of information. Revealing unreliable facts from the news using artificial intelligence methods is a difficult problem. To solve this problem, it is necessary to apply several existing models with the calculation of the reality parameter and recognition accuracy, as well as to develop a new algorithm for detecting fake news. The use of effective tools for identifying false information in the SIS and the corresponding algorithm is considered in support and decision-making systems, when determining the degree of information reliability</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/4ggt-evtf-rdn6</doi>
          <udk>355.404:004.738.52</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>open sources of information</keyword>
            <keyword>social information services</keyword>
            <keyword>false information</keyword>
            <keyword>reality parameter</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.2/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>26-36</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-1399-1822</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Shenets </surname>
              <initials>Nikolay</initials>
              <email>shenets_nn@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Mobile device user data protection approach based on multi-factor authentication, visual cryptography and steganography</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents a new approach for protecting user data of mobile phones. It combines multi-factor authentication, secret sharing, visual cryptography, steganography and uses built-in secure modules of the Android operating system. The proposed protocol ensures privacy of user data even if the mobile phone and its associated storage server are compromised</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rm3r-3f2m-a1kp</doi>
          <udk>004.056.53(003.26)</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>authentication and key establishment protocol</keyword>
            <keyword>wireless sensor network</keyword>
            <keyword>key predistribution</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.3/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>37-45</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zagalsky</surname>
              <initials>Dmitry</initials>
              <email>dzagalskii@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Solovey</surname>
              <initials>Roman</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9862-1507</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Dakhnovich</surname>
              <initials>Andrey</initials>
              <email>add@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A method for detecting manipulation attacks on recommendation systems with collaborative filtering</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article discusses the security of recommendation systems with collaborative filtering from manipulation attacks. The most common types of attacks are analyzed and identified. A modified method for detecting manipulation attacks on recommendation systems with collaborative filtering is proposed. Experimental testing and comparison of the effectiveness of the modified method with other relevant methods were carried out</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kf76-kmg6-1azr</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>recommendation systems</keyword>
            <keyword>collaborative filtering</keyword>
            <keyword>shilling attack detection.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.4/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>46-53</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-9451-8980</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MASCOM- Techlain LLC</orgName>
              <surname>Morgunov</surname>
              <initials>Vadim</initials>
              <email>v_a_m1998@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-3139-0748</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Origin Security</orgName>
              <surname>Antonov</surname>
              <initials>Roman</initials>
              <email>antonov@originsecurity.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of the international standard ISO 27701 and the formation of recommendations for its use</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Any organization, processing personal data of citizens of the European Union is obliged to comply with the requirements of GDPR (General Data Protection Regulation). However, the regulations do not contain information about how to comply with these requirements in practice. The international standard ISO 27701 solves this problem because it contains specific controls to fulfill requirements specified above. In the course of the research, the standard was analyzed and there were made up recommendations that can be applied to all types and sizes of organizations, including public and private companies, government entities and non-profit organizations that process personal data of citizens of the European Union.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/t17a-355v-exe9</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>personal data</keyword>
            <keyword>controls</keyword>
            <keyword>requirements</keyword>
            <keyword>GDPR</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.5/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>54-61</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6695-2328</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Garkushev</surname>
              <initials>Alexander</initials>
              <email>sangark@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Maritime Technical  University</orgName>
              <surname>Lipis</surname>
              <initials>Alexey</initials>
              <email>dlipis@smtu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanova</surname>
              <initials>Lyubov</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Forming the culture of digital security of students of higher educational institutions of shipbuilding profile</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to finding rational ways to improve the culture of digital security among future shipbuilders. An objective methodology for the formation of educational content based on the achievements of the theory of multi-parameter choice and the construction of a tuple of preferences when making complex cybernetic decisions is considered. An example of the choice of digital security training technology for students of shipbuilding profile (Saint Petersburg State Maritime Technical University) was considered</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pfap-9f4a-abmt</doi>
          <udk>004.056.5, 629.5.067</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>digital security</keyword>
            <keyword>distance learning</keyword>
            <keyword>safety culture</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.6/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>62-71</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gribkov</surname>
              <initials>Nikita</initials>
              <email>gribkov.na@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Detecting source code fragments similarity with machine learning algorithms</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a method for detecting source code fragments similarity using attribute abstract syntax trees and machine learning algorithms. The advantages of the method are determined based on a comparative analysis of existing approaches of detecting code clones. For&#13;
approaches, which use AST, it is possible to increase the efficiency of detecting similar source code fragments by detecting semantic clones with usage of method proposed.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/gnad-nf3e-63te</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>code clones</keyword>
            <keyword>syntactic similarity</keyword>
            <keyword>semantic similarity</keyword>
            <keyword>open-source software</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.7/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>72-78</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>The Bonch-Bruevich Saint Petersburg State University of Telecommunications</orgName>
              <surname>Kushnir</surname>
              <initials>Dmitry</initials>
              <email>dmitry.kushnir@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>The Bonch-Bruevich Saint Petersburg State University of Telecommunications</orgName>
              <surname>Shemyakin</surname>
              <initials>Sergey</initials>
              <email>s4421764@ya.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Decimation of M-sequences as a way to obtain primitive polynomials</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">One of the approaches to form a cryptographically secure encryption range is the use of linear recurrent feedback registers based on primitive polynomials. The operational possibility of choosing the appropriate polynomial can provide the required degree of stability of the algorithm used. At present, primitive polynomials are known for sufficiently large powers, but usually these are the so-called sparse polynomials. To improve cryptographic strength, it is necessary to be able to quickly form new primitive polynomials of given degrees, which is the subject of this study</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7n36-rhgn-4xz5</doi>
          <udk>004.056.55</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>primitive polynomials</keyword>
            <keyword>m-sequence</keyword>
            <keyword>decimation</keyword>
            <keyword>primitive root</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.8/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>79-87</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Vekshina</surname>
              <initials>Tatiana</initials>
              <email>t.v.vekshina@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Bolshakov</surname>
              <initials>Vladimir</initials>
              <email>v.a.bolsh@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Korinets</surname>
              <initials>Ekaterina</initials>
              <email>miffi89@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Current trends in methods of operational automation of data processing</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The problem of automating the determination of daily water consumption by continuously measured levels and discrete measurements of water flow using flow curves, which are the simplest characteristic of the capacity of the riverbed (and floodplain) and are widely used in river flow accounting and hydraulic calculations, is considered. Conclusions are made about the optimal analytical representation of the flow curve and the possibilities of constructing a universal model of hydrometric flow accounting.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/fexb-mznu-89p5</doi>
          <udk>556.536</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>water flow</keyword>
            <keyword>measured levels</keyword>
            <keyword>flow curves</keyword>
            <keyword>profiles</keyword>
            <keyword>interpolation</keyword>
            <keyword>approximation</keyword>
            <keyword>model</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.9/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>88-95</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Vekshina</surname>
              <initials>Tatiana</initials>
              <email>t.v.vekshina@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Bolshakov</surname>
              <initials>Vladimir</initials>
              <email>v.a.bolsh@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Korinets</surname>
              <initials>Ekaterina</initials>
              <email>miffi89@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Actual problems of automation and hydrological provision of waterways in the arctic zone</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The problems of hydrological support of water transport in the territories of Siberia and the Far East of the Russian Federation are considered. The requirements for operational information on the levels of water bodies, on a sharp change in water content, on channel deformations, on the ice situation and forecasts of these phenomena are analyzed. Attention is drawn to the need to use new modern information technologies</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/hp5t-8bdu-mvux</doi>
          <udk>656.628:556.536.537</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>water transport</keyword>
            <keyword>hydrological support</keyword>
            <keyword>riverbed processes</keyword>
            <keyword>hydrological regime</keyword>
            <keyword>information technologies</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.10/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>96-103</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7199-6384</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Special Technology Center LLC</orgName>
              <surname>Kurakin</surname>
              <initials>Alexander </initials>
              <email>akurakin@stc-spb.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">An approach to assessing the effectiveness of the functioning of a group of unmanned aerial vehicles in unpredictable situations</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to a method for evaluating the effectiveness of the use of a group of unmanned aerial vehicles when they perform aerial photography tasks. The approach is based on the principles of a «virtual squad» and assumes decentralized management and adaptive redistribution of roles in unpredictable situations.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/u438-a38e-4adv</doi>
          <udk>004.021</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>group of unmanned aerial vehicles</keyword>
            <keyword>virtual squad</keyword>
            <keyword>unified flight task</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.11/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>104-110</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanova </surname>
              <initials>Olga</initials>
              <email>ivanova.od@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">The hybrid method for evasion attacks detection in the machine learning systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An analysis of existing methods that provide the detection of evasion attacks in the machine learning systems is presented. An experimental comparison of these methods has been performed. The Uncertainty method is the most universal one, but its accuracy in detecting SGM, MS, BA evasion attacks is lower than that of other methods, and it is difficult to determine such values of the uncertainty boundary for adversarial samples that would allow more accurate detection of evasions. A new hybrid method has been proposed and discussed, which is a two-stage verification of input data, supplemented by input data pre-processing. In the proposed method, the threshold of uncertainty for adversarial samples has become distinct and quickly computable. The hybrid method allows detecting OOD attacks with 80 % accuracy, and SGM, MS, BA attacks with 93 % accuracy</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/nrmx-ah3v-d373</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>evasion attacks</keyword>
            <keyword>evasion attack detection</keyword>
            <keyword>hybrid method</keyword>
            <keyword>machine learning</keyword>
            <keyword>adversarial samples</keyword>
            <keyword>ODIN</keyword>
            <keyword>Uncertainty</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.12/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>111-118</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0374-4649</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Sergadeeva </surname>
              <initials>Anastasia</initials>
              <email>nsspbpoly@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">DDoS attacks detection based on a modular neural network</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes an approach to detection of Distributed Denial of Service (DDoS) attacks using a modular neural network, which is a series of connected neural networks that solve the problem step by step. The task of DDoS attack detection is decomposed into three interrelated subtasks: detection of anomalous network traffic, detection of DDoS attack traffic and identification of the type of realized DDoS attack, which is especially important due to the tendency of implementing multi-vector DDoS attacks. The results of experimental studies on the quality of performance of the constructed modular neural network confirmed the effectiveness of the proposed approach.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/65d1-nu8m-8euv</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>DDoS attacks</keyword>
            <keyword>modular neural network</keyword>
            <keyword>decomposition</keyword>
            <keyword>machine learning</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.13/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>119-127</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Electrotechnical University “LETI” named after V. I. Ulyanov (Lenin)</orgName>
              <surname>Grigorjeva</surname>
              <initials>Natalya</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9899-2778</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Platonov</surname>
              <initials>Vladimir</initials>
              <email>plato@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Protection against adversarial attacks on image recognition systems using an autoencoder</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Considered adversarial attacks on systems of artificial neural networks for image recognition. To increase the security of image recognition systems from adversarial attacks (avoidance attacks), the use of auto-encoders is proposed. Various attacks are considered and software prototypes of autoencoders of fully connected and convolutional architectures are developed as a means of protection against evasion attacks. The possibility of using the developed prototypes as a basis for designing autoencoders for more complex architectures is substantiated</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/8dd2-gfk4-aebe</doi>
          <udk>004.032.26</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>image recognition system</keyword>
            <keyword>adversarial attack</keyword>
            <keyword>evasion attack</keyword>
            <keyword>autoencoder.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.14/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>128-138</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2824-6590</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Almuhamedov</surname>
              <initials>Alexsey</initials>
              <email>aleksei.alm@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-7282-033X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Kolomoitcev</surname>
              <initials>Vladimir</initials>
              <email>dekoros@guap.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Application of machine learning methods in the problem of searching area of interest for biometric identification based on the pattern of palm veins</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article deals with the problem of finding a region of interest for biometric identification&#13;
based on the pattern of palm veins. An image segmentation method based on the use of&#13;
convolutional neural networks to search for an area of interest is proposed. The work of this method&#13;
is compared with methods that use the features of a binarized image, in particular, with the method&#13;
of searching for local minimums and searching for the minimum threshold value.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1416-12ar-74be</doi>
          <udk>612.087.1:57.087.1</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>biometrics</keyword>
            <keyword>vein pattern</keyword>
            <keyword>area of interest</keyword>
            <keyword>segmentation</keyword>
            <keyword>neural network</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.15/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>139-147</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2233-811X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Sukhov</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1404-6125</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Krupenin</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-6071-8087</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Yakunin</surname>
              <initials>Vladimir</initials>
              <email>Yavi1957@mil.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Criteria used to assess the quality of information security systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The criteria related to the construction of mathematical models of quality indicators for&#13;
further investigation of the effectiveness of the functioning of information security systems, taking&#13;
into account destructive influences, are considered. Geometric interpretations of the criteria of&#13;
three classes are presented. The distinctive features of the concepts «quality indicator» and «quality&#13;
assessment criterion» are revealed. A mathematical description of each of the criteria under&#13;
consideration is given.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/tnh1-52z5-ttkb</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>quality assessment criterion</keyword>
            <keyword>quality indicator</keyword>
            <keyword>efficiency</keyword>
            <keyword>information security system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.10.16/</furl>
          <file>2023_1.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
