<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>3</number>
    <altNumber> </altNumber>
    <dateUni>2023</dateUni>
    <pages>1-186</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-24</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Military Academy of the General Staff of the Armed Forces of the Russian Federation</orgName>
              <surname>Chernyshov</surname>
              <initials>Vladimir</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Glibovsky</surname>
              <initials>Pavel</initials>
              <email>vka@mil.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Timashov</surname>
              <initials>Pavel</initials>
              <email>vka@mil.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method of providing and conducting internal audit of information security of organisations on the basis of risk-oriented approach</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In order to guarantee effective information security of an organization, a systematic and comprehensive approach is necessary. One of the most effective tools for obtaining an independent and objective assessment of organizations’ security against information security risks and threats and evaluating the level of organization IS provision is the internal information security audit. Nowadays, more and more additional requirements are imposed to the methods of ensuring and conducting IS audit. Having analyzed the scientific literature, training manuals and articles in the field of information security, a method based on the risk-oriented approach is developed. The risk management theory and the internal audit methodology built on its basis should become the tools for conducting the audit. Information security audit based on the risk-oriented approach will make it possible to assess the security of the organization, identify risks, create and (or) adjust the plan of measures to minimize them, improve the interaction of departments responsible for control and risk management</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5hvf-zvdp-akn4</doi>
          <udk>004.021</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security audit</keyword>
            <keyword>risk-oriented approach</keyword>
            <keyword>risk matrix</keyword>
            <keyword>information security threats</keyword>
            <keyword>security level</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.1/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>25-32</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6753-2181</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg Federal Research Center of Russian Science Academy</orgName>
              <surname>Lebedev</surname>
              <initials>Ilya</initials>
              <email>isl_box@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1798-8257</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sukhoparov</surname>
              <initials>Mikhail</initials>
              <email>mail@sukhoparovm.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Improving the quality of information security state identification based on sample segmentation</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Improving the quality indicators of information security state identification of individual segments of cyber-physical systems is associated with the processing of large information arrays. We propose a method for improving quality indicators when solving problems of information security state identification. Its implementation is based on the formation of individual segments of the sample. The analysis of properties of these segments makes it possible to select and assign algorithms having the best quality indicators on the current segment. The segmentation of the data sample is considered. Experimental values of the quality index for the proposed method for different classifiers on individual segments and the whole sample are given on the example of real dataset data</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/9ppa-1zda-5vvd</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>machine learning</keyword>
            <keyword>data set</keyword>
            <keyword>data segmentation</keyword>
            <keyword>data sampling</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.2/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>33-57</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-8786-5661</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Fedosenko</surname>
              <initials>Maxim</initials>
              <email>fedosenkomaksim98@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Comparative analysis of the problems of the application of steganography methods in the implementation of illegal actions and its role in digital forensics</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This work contains a study of the problem of using steganographic algorithms by attackers to hide and exchange illegal data. The paper formulates the relevance of the problem by analyzing of the cases of using steganography in attacks on computer systems and based on the development trend of controlled Internet, supported by the legal framework. An analysis of methods for hiding data and their subsequent exchange on public Internet resources is presented through a review of the works of researchers in this area, the main tools used by attackers are identified and described. As an analysis of counteraction methods, a comparative description of use of the artificial intelligence technologies in the field of steganoanalysis is presented, the most promising and applicable for the tasks of automatic analysis of content posted on public Internet resources are identified. In the conclusion provisions of the work, the process of exchanging hidden data by malefactors using the model of EPC notation. The directions and tasks of steganoanalysis are highlighted, the solution of which will allow further development of a unified system for protecting public Internet resources, prospects for the use of new steganographic algorithms, such as hiding in the blockchain, source code are presented. resources and placement of content with the presence of physical attachments of information</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/hnud-f89z-8gx7</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>steganography</keyword>
            <keyword>steganoanalysis</keyword>
            <keyword>hidden data exchange</keyword>
            <keyword>intruder models</keyword>
            <keyword>artificial intelligence in steganoanalysis</keyword>
            <keyword>machine learning</keyword>
            <keyword>neural networks</keyword>
            <keyword>natural language processing</keyword>
            <keyword>blockchain</keyword>
            <keyword>static code analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.3/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>58-69</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-5511-4000</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Eremeev</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Zakharchuk</surname>
              <initials>Ivan</initials>
              <email>zaharchuk@mirea.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Risk assessment of using open source projects: analysis of existing approaches</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article analyzes the existing approaches to evaluating and accounting for the software composition analysis, including open source projects. The analysis of existing frameworks for evaluating software development processes is carried out, including from the point of view of information security. Considered typical risks of using open source components with open licenses. The possibility of evaluating development processes to identify threats to information security in open source projects was noted, as well as the need to automate such a process in order to ensure the efficiency of dependency management in projects using open components as dependencies</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/fhez-pk5k-7gze</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>software composition analysis</keyword>
            <keyword>open-source</keyword>
            <keyword>software development processes maturity</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.4/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>70-81</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0007-4911-8471</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Research Institute «Kvant»</orgName>
              <surname>Samarin</surname>
              <initials>Nikolay</initials>
              <email>samarin_nik@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Systematization of methods for finding errors in software</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article systematizes modern methods of searching for errors in software. For each method, a brief description and advantages and disadvantages are considered. On the basis of the analysis the most perspective methods from the point of view of the task of automating the process of searching errors in the software are distinguished.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/d7vk-49v5-8t3r</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>software</keyword>
            <keyword>error detection</keyword>
            <keyword>static analysis</keyword>
            <keyword>dynamic analysis</keyword>
            <keyword>symbolic execution</keyword>
            <keyword>fuzzing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.5/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>82-89</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Starodub</surname>
              <initials>Anna</initials>
              <email>romanstar75@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-7532-9607</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Mylnikov</surname>
              <initials>Vladimir</initials>
              <email>elinatn@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Ranking model of the system of compromise indicators of nodes of a corporate data transmission network</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A model of the system of ranking indicators of compromise for active counteraction to directed attacks is proposed, which allows pre-detecting threats and planning measures to eliminate them before their manifestation. Also an important aspect is the development of tools and methods for assessing sources of information on the level of trust to collect the necessary data in the investigation of incidents. Based on the proposed models, an information system for ranking indicators of compromise has been developed, which allows minimizing the possibility of violating confidentiality, integrity and availability of information, as well as compromising data in the system</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/z7b4-5dat-gd8u</doi>
          <udk>004.056.53</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>information protection</keyword>
            <keyword>indicators of compromise</keyword>
            <keyword>modeling methods</keyword>
            <keyword>information system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.6/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>90-102</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Tkachenko</surname>
              <initials>Sergey</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Kochetkov</surname>
              <initials>Ilya</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-1300-2470</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Mozhaysky Military Space Academy</orgName>
              <surname>Biryukov</surname>
              <initials>Denis</initials>
              <email>Biryukov.D.N@yandex.ru</email>
              <address>Russia, 197198, St. Petersburg, Zhdanovskaya str., 13</address>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Telbuh</surname>
              <initials>Vyacheslav</initials>
              <email>telbuh89@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Agent-based modelling information distribution in social-information internet services</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The observed increase in the number of threats in the field of information security of society and the state creates the need for their timely identification. The paper proposes a combined approach to identifying and categorizing agents that have the greatest impact on users in social networks, which consists in combining and consistently applying existing methods. A simulation model of information dissemination was created and tested, which made it possible to simulate the process of information interaction between participants of the Internet information and telecommunications network and the influence of malicious agents on them. The results of the experiment show that changing the configuration of the agency network of influence and increasing the psychological protection of users to destructive effects allows you to reduce the scale of distribution of negative content</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/721k-4dvv-a3t9</doi>
          <udk>004.67</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>social graph analysis</keyword>
            <keyword>dynamics of information flows</keyword>
            <keyword>social network</keyword>
            <keyword>manipulation of public opinion</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.7/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>103-116</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7271-8343</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Shilova</surname>
              <initials>Anastasiya</initials>
              <email>Bondareva.AD@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-6691-6167</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Vorobeva</surname>
              <initials>Alisa</initials>
              <email>alice_w@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A network access definition method to ensure network infrastructure security based on removal of excessive network connectivity</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The purpose of this work is to increase the security of the network infrastructure. A network infrastructure model has been developed, an access control method based on the elimination of excessive network connectivity between subjects and objects of access has been proposed and evaluated, the directions of its development have been described. The method can be used for network segmentation</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mr9d-5tum-xmdp</doi>
          <udk>004.72</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>access control</keyword>
            <keyword>network infrastructure</keyword>
            <keyword>firewall</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.8/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>117-125</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Artificial immunization in hierarchical and peer-to-peer networks for protection against cyber threats</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A description of immunization approaches for cyber-physical systems based on hierarchical and peer-to-peer network topology is presented. A systematic analysis of existing immunization methods based on graph theory, theoretical formalization, and experiment is performed. The approach showed sufficient efficiency of artificial immunization using global strategies for cyber-physical systems based on hierarchical network infrastructure</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/4bkh-ke2t-zz4u</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cybersecurity</keyword>
            <keyword>artificial immunization</keyword>
            <keyword>cyberphysical systems</keyword>
            <keyword>graph theory</keyword>
            <keyword>network topology</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.9/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>126-137</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6071-8087</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Yakunin</surname>
              <initials>Vladimir</initials>
              <email>Yavi1957@mil.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9665-2174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Samoilenko</surname>
              <initials>Dmitry</initials>
              <email>19sam@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-2233-811X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Sukhov</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0003-1404-6125</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Krupenin</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Characteristics of sensitivity and influence of parameters of the information security system model and its functioning process on the efficiency of the operation</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Algorithms for solving the direct and inverse problems of investigating the effectiveness of the functioning of the information security system have been developed and presented. The task of investigating the effectiveness of the operation is formulated. The characteristics of the sensitivity of the study of the effectiveness of the operation are considered. The characteristics of the influence of the parameters of the information security system model and its functioning process on the efficiency of the operation are described, namely: influence coefficient, instability coefficient, control potential, optimization potential</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1eat-bdvg-hg4e</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>analysis</keyword>
            <keyword>effectiveness</keyword>
            <keyword>sensitivity function</keyword>
            <keyword>information security system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.10/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>138-147</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Sakharov</surname>
              <initials>Vladimir</initials>
              <email>saharovvv@gumrf.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-6377-5581</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Baryshnikov</surname>
              <initials>Sergey</initials>
              <email>barychnikovso@gumrf.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Ivanyuk</surname>
              <initials>Vladimir</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Balance production models with information security</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Balance models of management and planning of processes of production of final products at enterprises are considered. Diagrams of the assembly of products based on the input - output method of Vasily Leontiev are given. According to the diagrams, according to the Gozint theorem, matrices of direct and complete needs are formed, according to which, according to the proposed algorithm, the required parts and assemblies are evaluated for the production of various products as a final product. A method of encryption and decryption is proposed for the transmission of messages in digital format containing calculated data and technological schemes that are confidential. Examples of performing digital operations are given</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7tvk-afen-h9dh</doi>
          <udk>2.3.3</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>balance model</keyword>
            <keyword>Gozint diagram</keyword>
            <keyword>matrices of direct and full needs</keyword>
            <keyword>plan</keyword>
            <keyword>algorithm</keyword>
            <keyword>confidential message</keyword>
            <keyword>encryption</keyword>
            <keyword>message extraction</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.11/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>148-153</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7959-3835</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg  State Maritime Technical University</orgName>
              <surname>Karpova</surname>
              <initials>Irina</initials>
              <email>ik070889@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-6695-2328</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Garkushev</surname>
              <initials>Alexander</initials>
              <email>sangark@mail.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Maritime Technical  University</orgName>
              <surname>Lipis</surname>
              <initials>Alexey</initials>
              <email>dlipis@smtu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Modeling of work of an employee of the information security service of an industrial enterprise</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article proposes a set of indicators that can be used to assess the quality of a specialist in the information security service of an industrial enterprise, as well as to assess the quality of its functioning in the process of work. Formula dependencies for calculating stochastic indicators are given, which allow to obtain some objective estimates of the subjective influence of the human factor on the safe functioning of information systems of industrial measures</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1vmb-73pk-5e9e</doi>
          <udk>004.056.5, 629.5.067</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>quality indicators</keyword>
            <keyword>information security</keyword>
            <keyword>information system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.12/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>154-169</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7564-6744</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Moscow Technical University of Communication and Informatics</orgName>
              <surname>Sheluhin</surname>
              <initials>Oleg</initials>
              <email>sheluhin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-7689-4678</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Moscow Technical University of Communication and Informatics</orgName>
              <surname>Rakovskiy</surname>
              <initials>Dmitry</initials>
              <email>Prophet_alpha@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Multi-label classification of labels of system logs of computer networks. Formalization of the task</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Purpose. An important problem in the intelligent processing of syslog data is the existence of datasets containing records with multiple class label associations. A dataset suitable for classification typically contains a set of features and an associated set of class labels. The goal of classification is a trained model capable of assigning an appropriate class to an unknown object (records in “historical data”). The solution to this problem is associated with an exponential growth of label combinations that must be taken into account, as well as the computational costs of training data-mining models. The problem of multi-label classes in relation to computer network (CN) is currently insufficiently studied. The aim of the study is to formalize the problem of multivalued classification of experimental data (binary or multiclass) using the example of CN system log entries and to demonstrate its applicability to information security problems. Novelty. The novelty of the study lies in illustrating the presence of multi-labeled class labels in the analysis of syslog entries generated by CN. It is shown that this feature is inherent in most CNs, which are subject to boundary requirements for several indicators (attributes) of a predetermined Service Level Objectives. In case of occurrence of anomalous states for several attributes at once, an increase in the number of labels is a prerequisite for the occurrence of a rare anomalous state (system anomaly) CN at the current time. Results. It is shown that the problem of ambiguity of system log class labels is relevant for the analysis of the availability and integrity of information circulating in the CN. It is shown that the ambiguity of class labels manifests itself not only in the occurrence of several CN states at the current time, but also in the implicit multi-valued mapping of known CN attributes to these states. It is shown that with unambiguous learning, the label returned by such algorithms is a scalar value, and the resulting one-label classifiers label the data with loss of information. The multi-valued approach operates with labels assets (or vectors), and the resulting multi-valued classifier can assign several labels to CN states at once, which increases the classification accuracy. The significance of the secondary attributes of “historical data”, which determine the quality of a multivalued classification, is shown. Practical relevance. Multi-labeled system log class labels are relevant in the areas of diagnosing malfunctions of CS hardware components, detecting attacks, detecting suspicious network activity, and other information security tasks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ndfd-tk9h-reuz</doi>
          <udk>004.67</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>computer networks</keyword>
            <keyword>multi-labeled classification</keyword>
            <keyword>multiclass classification</keyword>
            <keyword>information security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.13/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>170-176</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>St. Petersburg State University of Aerospace Instrument Engineering</orgName>
              <surname>Grigoriev</surname>
              <initials>Maxim</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-6419-0072</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Tatarnikova</surname>
              <initials>Tatiana</initials>
              <email>Tm-tatarn@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Development of a trainable neural network for analysis of linguistic data</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The description of the developed linguistic application for the recognition of ancient Egyptian hieroglyphs is given. The main methods for creating and training a neural network are considered and a method suitable for the successful operation of the algorithm for recognizing ancient Egyptian hieroglyphs is determined. Based on the analysis of tools for solving the problem, the method of learning with a teacher and the convolutional type of neural network were chosen as optimal for image recognition with the ReLu activation function. In the future, the proposed neural network will find application in the development of a dictionary with a character recognition function.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rt28-tnke-68b2</doi>
          <udk>004.032.26</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>ancient Egyptian hieroglyphs recognition</keyword>
            <keyword>Gardiner code</keyword>
            <keyword>convolutional neural network</keyword>
            <keyword>classification</keyword>
            <keyword>application</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.14/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>177-185</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0554-5790</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Abramov</surname>
              <initials>Valery</initials>
              <email>val.abramov@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-7601-2874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Profinfotech LLC</orgName>
              <surname>Chestnov</surname>
              <initials>Arsenii</initials>
              <email>arsenij430@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Creation and prospects of development of software for finding snow cover maxima from databases of meteorological archives</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The team of authors has developed algorithms and compiled a program code for processing large arrays of meteorological data in order to determine the maximum snow cover with specific dates.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5h2z-hprm-pb9h</doi>
          <udk>2.3.3</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>meteorology</keyword>
            <keyword>arrays</keyword>
            <keyword>program code</keyword>
            <keyword>snow cover</keyword>
            <keyword>data processing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.13.15/</furl>
          <file>2023_3-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
