<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>2</number>
    <altNumber> </altNumber>
    <dateUni>2023</dateUni>
    <pages>1-212</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-16</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2393-9603</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Samara State Technical University</orgName>
              <surname>SHAKURSKIY</surname>
              <initials>Maxim</initials>
              <email>vigorsilentium@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Povolzhskiy State University of Telecommunications and Informatics</orgName>
              <surname>KARAULOVA</surname>
              <initials>Olga</initials>
              <email>olya4369@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Evaluation of signal masking by a two-component steganographic system in windowed information processing</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">When considering digital systems for transmitting information in real time, in most cases,&#13;
the transmission of information in blocks with a given delay time is implied. In this case, the&#13;
delay determines the size of the sampling window. The article deals with the issues of masking an&#13;
embedded message into an uncompressed audio signal with a variable size of the sample being&#13;
processed.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/r5at-29vv-uzbz</doi>
          <udk>621.372.552</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>steganography</keyword>
            <keyword>sound</keyword>
            <keyword>masking of information</keyword>
            <keyword>two-component steganographic system</keyword>
            <keyword>real time system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.1/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>17-26</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>LOGINOV</surname>
              <initials>Zakhar</initials>
              <email>loginoff.zahar@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Solovey</surname>
              <initials>Roman</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9862-1507</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Dakhnovich</surname>
              <initials>Andrey</initials>
              <email>add@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using botnet coordination detection to detect social information campaigns</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The features of information campaigns, the principles of dissemination of information&#13;
campaigns in social networks are considered. Groups of methods for detecting information&#13;
campaigns are analyzed and identified. The problems of existing approaches are highlighted.&#13;
A group of methods based on the detection of coordination is considered. The article proposes an&#13;
algorithm for detecting influence campaigns implemented by a botnet in a social network using&#13;
the algorithm bee colony.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/75d2-g6zu-dbvu</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>social networks</keyword>
            <keyword>influence campaign</keyword>
            <keyword>botnet</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.2/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>27-36</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7959-3835</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg  State Maritime Technical University</orgName>
              <surname>Karpova</surname>
              <initials>Irina</initials>
              <email>ik070889@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>St. Petersburg military order of Zhukov institute of the national guard of the Russian Federation</orgName>
              <surname>KURILOV</surname>
              <initials>Alexey</initials>
              <email>AK1225@rambler.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanova</surname>
              <initials>Lyubov</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Accounting for the impact of the human factor in cyber security models</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A comprehensive cybersecurity risk assessment is a complex multi-level task involving&#13;
technical, software, external and human factors. As part of the development of a predictive model for&#13;
assessing cybersecurity risks, characterization of the human factor is necessary to understand how&#13;
the actions of information security specialists affect the risk of developing cybersecurity threats. The&#13;
article discusses the concept of “reliability” in relation to the human factor in the cybersecurity system.&#13;
It has two main components: innate characteristics, which are part of the personality, and situational&#13;
characteristics, which are outside the personality. The use of reliability as a Human Factors&#13;
parameter in a comprehensive cybersecurity risk assessment will also depend on an understanding of how different mental models and behavioral responses affect the level of trust placed in an information security professional and the biases that affect the ability to provide such trus</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/e75d-r7xt-rzt2</doi>
          <udk>004.942</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>cyber security model</keyword>
            <keyword>information system reliability</keyword>
            <keyword>human factor</keyword>
            <keyword>cyber defense</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.3/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>37-46</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-3830-1840</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Yugai</surname>
              <initials>Pavel </initials>
              <email>yugaj_pe@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-7321-7430</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zhukovskii </surname>
              <initials>Evgeniy </initials>
              <email>bugaev.va@edu.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Semenov</surname>
              <initials>Pavel</initials>
              <email>semenov_po@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Aspects of detecting malicious installation files using machine learning algorithms</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This work presents the research of using machine learning methods to detect malicious&#13;
installation files, specifically trojan droppers and downloaders, and installers with extraneous&#13;
functionality. A comparative analysis of some classification methods of machine learning is presented:&#13;
the naive bayes classifier, the random forest and the C4.5 algorithms. The classification&#13;
was carried out using the Weka software in accordance with the methods under consideration.&#13;
Significant attributes of executable files are defined, which give positive results in the classification&#13;
of legitimate installers and trojans</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/f7zd-7gf2-rd39</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>malware</keyword>
            <keyword>installation files</keyword>
            <keyword>trojans</keyword>
            <keyword>droppers</keyword>
            <keyword>machine learning</keyword>
            <keyword>naive bayes classifier</keyword>
            <keyword>random forest</keyword>
            <keyword>C4.5 algorithms</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.4/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>47-60</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gribkov</surname>
              <initials>Nikita</initials>
              <email>gribkov.na@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of decompiled program code using abstract syntax trees</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a method of preprocessing fragments of binary code for the task of detection their similarity using machine learning algorithms. The method is based on analysis of pseudocode, which is retrieved from decompilation process. The pseudocode is preprocessed with usage of attributed abstract syntax trees. Evaluation of the method indicates its efficiency in binary code similarity detection task due to semantic vectors used for abstract syntax tree modification.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ruar-u6he-kmd4</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>code clones</keyword>
            <keyword>syntactic similarity</keyword>
            <keyword>semantic similarity</keyword>
            <keyword>binary code similarity</keyword>
            <keyword>abstract syntax tree</keyword>
            <keyword>pseudocode</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.5/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>61-72</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7282-033X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Kolomoitcev</surname>
              <initials>Vladimir</initials>
              <email>dekoros@guap.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Methods of monitoring the execution of the security pattern in infocommunication systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The protection of infocommunication systems includes a wide number of information security means. There is a possibility of bypassing some of them by an intruder, thus breaking the assumed security script of the information protection system. The methods of monitoring the correct sequence of the use of information security means in the infocommunication system are proposed. The proposed methods make it possible to grow up the degree of security of infocommunication systems by confirming the fact of the use of all means and ways of information protection proposed by the architect of the information protection system</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7kda-4z89-66zf</doi>
          <udk>004.051</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information protection</keyword>
            <keyword>computing systems</keyword>
            <keyword>information security means</keyword>
            <keyword>pattern of secure access</keyword>
            <keyword>information security</keyword>
            <keyword>methods of monitoring</keyword>
            <keyword>security pattern</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.6/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>73-81</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0001-1385-8028</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Orel</surname>
              <initials>Eugeniy</initials>
              <email>orel_em@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0002-7009-2265</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anoshkin</surname>
              <initials>Ilya </initials>
              <email>ilya.anoschkin@outlook.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Decentralized messaging systems architecture stability analysis</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents the results of the architecture stability analysis of messaging systems with a decentralized node structure Briar and Bridgefy. Developed mathematical models of target systems describe protocols for generating keys, establishing a connection and transferring data between system users. The key features of the architecture of messaging systems with a decentralized nodal structure are highlighted. The main classes of threats to target systems are determined</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/dvxu-66z9-87ue</doi>
          <udk>004.72</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>decentralized systems</keyword>
            <keyword>network degradation</keyword>
            <keyword>mesh-messengers</keyword>
            <keyword>Briar</keyword>
            <keyword>Bridgefy</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.7/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>82-91</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Semyanov</surname>
              <initials>Pavel</initials>
              <email>semyanov_pv@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Grezina</surname>
              <initials>Sofia</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Bitcoin Core cryptocurrency wallet cryptographic security analysis</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article discusses the encryption security of the Bitcoin Core cryptocurrency wallet. Particular attention is paid to aspects of the practical implementation of cryptographic algorithms when encrypting the wallet.dat file with a password. The practical strongness to brute-force attacks using parallel computing on the GPU is also considered. It was found that Bitcoin Core did not implement an encryption key change for private keys. This implementation makes it possible to re-attack the wallet without knowing the new password, if it has already been compromised before. The changes to encryption algorithms that complicate the password brute force attacks on the GPU are also proposed</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mrx7-m1rk-2316</doi>
          <udk>004.056.55</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Bitcoin Core cryptocurrency wallet</keyword>
            <keyword>cryptocurrency wallet encryption</keyword>
            <keyword>encryption key change</keyword>
            <keyword>Bitcoin Core wallet attack</keyword>
            <keyword>brute force attack on GPU</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.8/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>92-106</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Academy of the Russian Federal Guard Service</orgName>
              <surname>Vasinev</surname>
              <initials>Dmitry</initials>
              <email>vda33@academ.msk.rsnet.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Academy of the Russian Federal Guard Service</orgName>
              <surname>Semenov</surname>
              <initials>Alexey</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of functionality and future options for the application of a new generation firewall to protect critical information infrastructure facilities</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An analysis of the requirements of guiding documents for ensuring the security of critical information infrastructure facilities has been carried out. A classification of information security tools of the firewall class with a description of each, their implementation scenario and a generalized network diagram, taking into account the application of these solutions in the field of information security, are presented. A comparative analysis of existing firewalling solutions is made, followed by conclusions about using some of them to protect critical information infrastructure facilities. A solution is offered to develop the functionality of a new generation firewall</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7e7b-6rdh-6rb1</doi>
          <udk>004.056.52</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>threats</keyword>
            <keyword>firewall</keyword>
            <keyword>next generation firewall</keyword>
            <keyword>critical information infrastructure</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.9/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>107-122</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zavadskii</surname>
              <initials>Evgeniy </initials>
              <email>zavadskij_ev@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Cyber resiliency support based on methods of graph analysis and functional network virtualization</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An integrated approach to the maintenance of the cyber resiliency of cyber-physical systems represented as a network of functional nodes has been proposed. Based on the analysis of the graph of functional dependencies and the graph of attacks, this approach makes it possible to detect compromised nodes and rebuild the functional network of the system, moving the compromised nodes to an isolated virtual network similar to the one actually attacked, and then adapt the functional sequence of nodes that implement the technological process, thereby preventing the development of a cyber threat. The experimental results have demonstrated the correct operation of the proposed solution and the formation of an adequate counteraction to the intruders</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/zn9e-pt1u-54ee</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>attack graph</keyword>
            <keyword>cyber resiliency</keyword>
            <keyword>cyber-physical system</keyword>
            <keyword>functional dependencies graph</keyword>
            <keyword>functional infrastructure</keyword>
            <keyword>virtual isolated network</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.10/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>123-139</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0000-3249-4103</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bogina</surname>
              <initials>Vasilisa</initials>
              <email>bogina_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A probabilistic approach to assessing the cyber resilience of mobile networks based on their connectivity</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper proposes an approach to assess the cyber resilience of mobile networks, based on the assessment of the probability that the network remains coherent under conditions of random movement of its nodes. The approach is aimed at countering the mobile network-specific attacks of hijacking and impersonation of one or more nodes, so that the network loses the ability to perform its target function</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/m21d-9zr3-gp82</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>mobile networks</keyword>
            <keyword>network connectivity</keyword>
            <keyword>probability of node movement</keyword>
            <keyword>hijacking attacks</keyword>
            <keyword>impersonation attacks</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.11/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>140-149</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Jet Infosystems</orgName>
              <surname>Markov</surname>
              <initials>Georgy</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Application of the neocortex model to detect contextual anomalies in network traffic of the industrial Internet of Things</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper investigates the problem of detecting network anomalies in the processing of data streams in industrial systems. The network anomaly is understood as the malicious signature and the current context: the network environment and topology, routing parameters and node characteristics. As a result of the study, it was proposed to use a neocortex model that supports the memory mechanism to detect network anomalies</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/b5fk-dug5-3g37</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>hierarchical temporary memory</keyword>
            <keyword>artificial intelligence</keyword>
            <keyword>contextual anomalies</keyword>
            <keyword>machine learning</keyword>
            <keyword>neocortex</keyword>
            <keyword>industrial internet of thighs</keyword>
            <keyword>network traffic</keyword>
            <keyword>HTM</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.12/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>150-162</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zubkov</surname>
              <initials>Evgeny</initials>
              <email>zubkov.e@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Cybersecurity assessment of cyber-physical system based on analysis of malware signatures</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The structure and main properties of a generalized cyber-physical system are investigated. Threats of information security and main approaches to ensure the cybersecurity of these systems are analyzed. The method of assessing the degree of compromise of a generalized cyber-physical system, based on the analysis of indicators of compromise is presented</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kfpz-v3xe-v5bz</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>indicator of compromise</keyword>
            <keyword>Industry 4.0</keyword>
            <keyword>cybersecurity</keyword>
            <keyword>cyber-physical system</keyword>
            <keyword>TCP / IP model</keyword>
            <keyword>graph theory</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.13/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>163-172</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Jet Infosystems</orgName>
              <surname>Markov</surname>
              <initials>Georgy</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <orcid>0000-0002-8627-4947</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Busygin</surname>
              <initials>Alexey</initials>
              <email>a.busygin@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Detection of computer attacks in networks of industrial Internet of Things based on the computing model of hierarchical temporary memory</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper discusses the problem of detecting network anomalies caused by computer attacks in industrial Internet of Things networks. To detect anomalies, a new method has been developed using the technology of hierarchical temporary memory, which is based on the innovative neocortex model. An experimental study of the developed anomaly detection method based on the HTM model demonstrated the superiority of the developed solution over the LSTM-based analogue. The developed prototype of the anomaly detection system provides continuous online unsupervised learning, takes into account the current network context, and also applies the accumulated experience by supporting the memory mechanism</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/v8z1-3b2n-z84u</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Hierarchical Temporary Memory</keyword>
            <keyword>Artificial Intelligence</keyword>
            <keyword>Computer Attacks</keyword>
            <keyword>Neocortex</keyword>
            <keyword>Online Learning</keyword>
            <keyword>Sparse Distributed Representations</keyword>
            <keyword>Network Traffic</keyword>
            <keyword>HTM</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.14/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>173-182</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2141-6780</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great Saint-Petersburg Polytechnic University</orgName>
              <surname>Shtyrkina</surname>
              <initials>Anna</initials>
              <email>anna_sh@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method of cyberphysical system topology reconfiguration based on graph artificial neural network</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposed approach to estimation the resilience of cyber-physical systems, as well as a method for their reconfiguration to neutralize the negative effects of structural attacks. The proposed method is applied to systems modeled by graphs, each vertex of which is associated with attributes - types of devices. The functioning of such systems is determined by the path on the graph, passing through the vertices of a given type. The reconfiguration method based on the graph artificial neural network (ANN) aims at increasing the number of working paths without the need to add new edges. The ANN model was trained on a synthetic dataset composed of random graphs whose vertex types were specified according to the betweenness centrality metric</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/6ma2-16a5-3bg4</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cyber-physical systems</keyword>
            <keyword>graph theory</keyword>
            <keyword>graph artificial neural network</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.15/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>183-190</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2233-811X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Sukhov</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Approaches to solving the problem of synthesis of an effective process of functioning of military-technical systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Approaches related to solving the inverse problem of investigating the effectiveness of purposeful technical systems are considered. The classification of the tasks of the study of the effectiveness of the operation conducted by the military-technical system is given. A formal and informal approach to solving the task is outlined. The criteria of suitability for evaluating the effectiveness of the operation carried out by a purposeful technical system are formulated. Three statements of the problem of synthesis of the object under study are formulated</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/h86u-pdbn-4kpp</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>synthesis</keyword>
            <keyword>functioning process</keyword>
            <keyword>efficiency</keyword>
            <keyword>military-technical system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.16/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>191-201</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>St. Petersburg branch of JSC KB NAVIS</orgName>
              <surname>Milyakov</surname>
              <initials>Denis</initials>
              <email>denis@inwin.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Russian Geographical Society</orgName>
              <surname>Travin</surname>
              <initials>Sergey</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Artificial neural networks in the navigation safety system of autonomous unmanned vessels</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article reviews the use of artificial neural networks to ensure the navigational safety of navigation of an autonomous unmanned vessel</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/4efx-dtmm-g1a9</doi>
          <udk>004.032.26:004.93’11:656.62</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>unmanned vessel</keyword>
            <keyword>navigation</keyword>
            <keyword>neural networks</keyword>
            <keyword>information theory</keyword>
            <keyword>modeling</keyword>
            <keyword>e-navigation</keyword>
            <keyword>navigation safety</keyword>
            <keyword>geoinformation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.17/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>202-211</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Tkacheva</surname>
              <initials>Ekaterina</initials>
              <email>tkacheva.ki@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Decentralized approach to intrusion detection in dynamic networks of the Internet of Things basing on multi-agent reinforcement learning and inter-agent communication</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a multi-agent reinforcement learning technology for intrusion detection in the Internet of Things. Three models of a multi-agent intrusion detection system have been implemented - a decentralized system, a system with the transmission of forecasts, a system with the transmission of observations. The obtained experimental results have been compared with the open intrusion detection system Suricata. It has been demonstrated that the proposed architectures of multi-agent systems are free from the weaknesses found in the usual solutions</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/npx5-z2hr-h5ux</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>agent</keyword>
            <keyword>decentralized system</keyword>
            <keyword>internet of things</keyword>
            <keyword>greedy algorithm</keyword>
            <keyword>cybersecurity</keyword>
            <keyword>machine learning</keyword>
            <keyword>multi-agent reinforcement learning</keyword>
            <keyword>intrusion detection</keyword>
            <keyword>observation data transferring</keyword>
            <keyword>prediction data transferring</keyword>
            <keyword>DQN</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.11.18/</furl>
          <file>2023_2.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
