<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>2</number>
    <altNumber> </altNumber>
    <dateUni>2024</dateUni>
    <pages>1-194</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-19</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-0950-901X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Vedernikov</surname>
              <initials>Yuriy</initials>
              <email>vedernikov.yura@yandex.ru</email>
              <address>St. Petersburg State Maritime Technical University</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-6695-2328</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Garkushev</surname>
              <initials>Alexander</initials>
              <email>sangark@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Maritime Technical  University</orgName>
              <surname>Lipis</surname>
              <initials>Alexey</initials>
              <email>dlipis@smtu.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Reconfiguration of the system development model information security management: interaction of base modules with the operator</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to the study of the possibility of modernizing the information security management systems of industrial enterprises by applying modern optimization methods. In addition to discrete deterministic values of parameters that reflect the influence of various factors on information security, propose to take into account heterogeneous indicators specified numerically, interval, verbally and using parametric series. A model of implementation in the form of a program that allows you to make an informed choice of the best of the alternatives.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/amv1-kdnf-zaae</doi>
          <udk>004.942</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security model</keyword>
            <keyword>optimization</keyword>
            <keyword>ranking</keyword>
            <keyword>priority system</keyword>
            <keyword>preference matrix</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.1/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>20-30</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Jet Infosystems</orgName>
              <surname>Markov</surname>
              <initials>Georgy</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Mathematical model of information security event management using Markov chain in industrial systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper examines the problem of ensuring information security in industrial Internet of Things systems. The study found that in order to comprehensively protect the information perimeter of an industrial enterprise from external and internal threats, in most cases information security event and incident management systems (SIEM systems) with customized rules for correlating events in the information infrastructure are used. At the same time, there is a need to create a mathematical apparatus that allows one to accurately and objectively assess the effectiveness of the SIEM system. As a result of the study, the problem of preventing information security incidents in industrial Internet of Things systems was formalized based on the developed mathematical model for managing information security events using a continuous-time Markov chain.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/vzkp-rbuh-xd9m</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>mathematical model</keyword>
            <keyword>industrial Internet of things</keyword>
            <keyword>information security event management</keyword>
            <keyword>Markov chains</keyword>
            <keyword>SIEM system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.2/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>31-43</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6753-2181</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg Federal Research Center of Russian Science Academy</orgName>
              <surname>Lebedev</surname>
              <initials>Ilya</initials>
              <email>isl_box@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1798-8257</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sukhoparov</surname>
              <initials>Mikhail</initials>
              <email>mail@sukhoparovm.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0008-0128-4144</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Tikhonov</surname>
              <initials>Daniil</initials>
              <email>tikhonovdanil@gmail.com</email>
              <address>Saint-Petersburg Federal Research Center of Russian  Science Academy</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Quality improvement of information security events identification through input data splitting</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The processing of information sequences using segmentation of input data is proposed, aimed at improving the quality of detection of destructive influences using machine learning models. The basis of the proposed solution is the division of data into segments with different &#13;
properties of the objects of observation. A method using a multi-level data processing architecture is described, where learning processes are implemented at various levels, the analysis of the achieved values of quality indicators and the assignment of the best models for quality indicators to individual data segments. The proposed method makes it possible to improve the quality indicators for detecting destructive information influences by segmenting and assigning models that have the best performance in individual segments.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/znn9-1vat-6xdp </doi>
          <udk>004.048</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>machine learning</keyword>
            <keyword>data set</keyword>
            <keyword>data sampling</keyword>
            <keyword>data segmentation</keyword>
            <keyword>processing models</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.3/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>44-56</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2765-0973</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Safiullina</surname>
              <initials>Lina</initials>
              <email>SafiullinaLKh@corp.knrtu.ru</email>
              <address>Kazan National Research Technological University</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-8927-9113</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Kasimova</surname>
              <initials>Alina</initials>
              <email>KasimovaAR@corp.knrtu.ru</email>
              <address>Kazan National Research Technological University</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-6119-1934</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Alekseeva</surname>
              <initials>Anna</initials>
              <email>annank90@mail.ru</email>
              <address>Kazan National Research Technological University</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of the reliability of storing templates when introducing modern biometric technologies into information security systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Currently, it can be argued that in certain areas of information technology, there is a complete replacement of classical computer system user authentication systems based on passwords and tokens with biometric technologies. However, biometric systems are vulnerable to various types of security threats. For example, in them, unlike the same passwords and tokens, templates based on biometrics cannot be replaced in case of compromise. To solve this problem, new protection schemes have been developed. Conventionally, they can be divided into two groups: biometric cryptography and cancelable biometrics. Biometric cryptography methods show average values of errors of the first and second types; experimental work in this area is widely known. Cancelable biometrics can be highly reliable, but there is not much experimental data on them. This paper presents a comparative analysis of the reliability of existing methods. It is shown that among the static biometric parameters the greatest interest is the iris, and among the dynamic ones – the keyboard stroke. However, using these methods, like others, has its own difficulties and risks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/2hkg-u23v-g9xv</doi>
          <udk>004.93, 64.066.8</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>identification</keyword>
            <keyword>authentication</keyword>
            <keyword>biometrics</keyword>
            <keyword>template</keyword>
            <keyword>biometric cryptography</keyword>
            <keyword>cancelable biometrics</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.4/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>57-65</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0374-4649</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Sergadeeva </surname>
              <initials>Anastasia</initials>
              <email>nsspbpoly@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Countering steganalysis based on generative adversarial networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes the generative adversarial network approach to improve the robustness of the steganographic method against modern stegoanalyzers. The approach is based on the joint operation of generative adversarial network, pixel importance map and least significant bit replacement method. The results of experimental studies confirmed the effectiveness of the proposed approach.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/aara-dg74-ata6</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>generative adversarial networks</keyword>
            <keyword>steganography</keyword>
            <keyword>steganography method</keyword>
            <keyword>steganalysis</keyword>
            <keyword>machine learning</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.5/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>66-72</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6377-5581</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Baryshnikov</surname>
              <initials>Sergey</initials>
              <email>barychnikovso@gumrf.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Sakharov</surname>
              <initials>Vladimir</initials>
              <email>saharovvv@gumrf.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0003-0554-5790</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Abramov</surname>
              <initials>Valery</initials>
              <email>val.abramov@mail.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <individInfo lang="ENG">
              <surname>Shnurenko</surname>
              <initials>Anatoly</initials>
              <email>dock@ksz.spb.ru</email>
              <address>«Kanonerskiy Ship Repair Plant» CJSC</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Automation of ship repair management</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Tools development results for automating ship repair management processes are presented. It is indicated, that development of adequate and stable model and the choice of algorithms for its use are of key importance, their correctness is shown.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/a6v5-3det-fzv9</doi>
          <udk>681.5.011</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>automation</keyword>
            <keyword>management</keyword>
            <keyword>ship repair</keyword>
            <keyword>model</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.6/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>73-83</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-4322-3223</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Egorova</surname>
              <initials>Kristina</initials>
              <email>natashov1397@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Glebov</surname>
              <initials>Nikolay</initials>
              <email>glebovnb@gumrf.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-7648-5321</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Goloskokov</surname>
              <initials>Konstantin</initials>
              <email>goloskokovkp@gumrf.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Automated system for monitoring and predicting the spread of oil spills in aquatic environment using a group of UAVs</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article is dedicated to studying the spreading of oil spills in the aquatic environment and developing a corresponding monitoring system using a group of unmanned aerial vehicles. To effectively control and prevent the spread of oil spills in water bodies, the process of comprehensive monitoring and forecasting needs to be automated. The foundation of such an automated system lies in mathematical models that enable the assessment of spill parameters, prediction of its trajectory, and determination of strategies to prevent and mitigate associated issues. The automation of monitoring and forecasting allows for continuous observation of the state of water resources and swift response to potential oil leaks. With the help of specialized sensors, unmanned aerial vehicles, and other technical means, it is possible to monitor changes in water conditions, detect the presence of oil spills, and determine their sizes. By possessing the ability to promptly respond to spills, the system ensures proper containment of leaks and minimization of negative environmental impact, as well as enables the development of strategies to prevent similar incidents in the future</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7bff-vvhf-p294</doi>
          <udk>681.5, 004.9</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>oil spills</keyword>
            <keyword>water environment</keyword>
            <keyword>unmanned aerial vehicles</keyword>
            <keyword>automation</keyword>
            <keyword>monitoring system</keyword>
            <keyword>forecasting</keyword>
            <keyword>environmental protection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.7/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>84-94</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gavva</surname>
              <initials>Georgij</initials>
              <email>gavva.gd@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Ensuring the connectivity and functional integrity of wireless reconfigurable networks by rebuilding the topology using an improved method of network game</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A comparative analysis of methods for protecting reconfigurable wireless networks that implement topology re-building was carried out, which made it possible to determine the network game method as the most promising in solving the task of maintaining the network connectivity and functional integrity. Managing the network topology when using the basic network game method is characterized by overloading the channels of the control node and excessive sensitivity to changes in network connections. In this research, the basic method is extended with the criterion of the maximal possible path length, which allows reducing the number of network reconfigurations when there is a short route between nodes passing through existing connections. It is experimentally shown that the improved method provides protective online restructuring of a network with lower topology rebuilding costs</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/tdnx-gf17-e1e5</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>wireless reconfigurable network</keyword>
            <keyword>gaming approach</keyword>
            <keyword>network game</keyword>
            <keyword>reconfiguration</keyword>
            <keyword>path length</keyword>
            <keyword>functional integrity</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.8/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>95-103</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0006-6856-2108</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pahomov</surname>
              <initials>Maksim</initials>
              <email>pahomov_ma@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Ensuring information security of vanets based on early detection of malicious nodes</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The features of VANETs are considered. An approach to ensuring the information security of VANETs is proposed, the distinctive feature of which is the early detection of malicious activity of network nodes. To achieve early detection of malicious activity, the parameters of VANETs are presented as a time series, after which their future values are predicted and anomalies are searched by using machine learning methods. The proposed approach makes it possible to improve the safety of intelligent transport systems</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/grg8-p2zd-5gbt</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>VANET</keyword>
            <keyword>time series prediction</keyword>
            <keyword>attacks prevention</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.9/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>104-116</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-0920-9009</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>The Ministry of Science and Education of the Republic of Azerbaijan</orgName>
              <surname>Pashayev</surname>
              <initials>Fahrad Heydar</initials>
              <email>pasha.farhad@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-4985-6371</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Nakhchivan State Universty</orgName>
              <surname>Zeynalov</surname>
              <initials>Javanshir Ibrahim</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0001-3136-6684</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Nakhchivan University</orgName>
              <surname>Najafov</surname>
              <initials>Hasan Taghi</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Creatıon of software technıcal tools to protect technologıcal processes from ınternet threats</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">It is known that the rapid development of technological computer networks and SCADA systems has necessarily accelerated the process of integration between these networks and global Internet networks. As a result, the solution of many issues of technological and production processes has been simplified and opportunities have been created for remote control of the enterprise staff and operational staff. However, this situation has also created new threats previously non-existent to the above-mentioned monitoring, diagnostic and management systems. Targeted attacks are organized by specific specialized groups, hackers and, in some cases, government agencies on the Internet for specific industrial enterprises. Those who organize cyber attacks on technological process control systems, over time, improve their methods and tools, increase their professional level. They carefully study the objects they will attack and identify vulnerabilities in the software of the object management systems. Developed set of technical means is based on the application of STM32F4XX type controllers and LPT ports of computers. The article provides connection diagrams and assembly methods of technical means. These technical means and the exchange protocols created can act as a bridge between the global Internet and technological corporate computer networks. The article presents simple algorithms of protocols and working program fragments. Fragments of the program are given in the C programming language and in the DELPHI programming system. The developed software acts as a filter bridge between the global Internet and TKKŞ. Data exchange between these two networks is carried out by creating non-standard protocols using STM32F4XX controllers and LPT ports</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/p79a-z1nu-71vk</doi>
          <udk>004.3; 004.4</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Internet attacks</keyword>
            <keyword>technological computer networks</keyword>
            <keyword>telemechanical systems</keyword>
            <keyword>malware</keyword>
            <keyword>random attacks</keyword>
            <keyword>STM32F4XX controller</keyword>
            <keyword>LPT port</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.10/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>117-129</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0002-1075-6808</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Salihov</surname>
              <email>fanny2man@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A model of a distributed storage system for private keys of crypto wallets</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">With the development of Web3 technologies, the third generation of the Internet has become one of the most promising areas. It involves the use of decentralized, transparent and user-oriented applications. However, many Web3 projects do not pay due attention to security, which can lead to serious consequences. Even a small error in the code can make the system vulnerable, opening access to intruders. Because of this, the industry faces frequent security breaches that threaten users and undermine trust in new technologies. One of the main problems of Web3 is the management of private keys. This is a critical aspect of security, which is directly related to the protection of digital assets and personal information of users. The risk of loss or theft of the private key can lead to irreparable consequences, since in case of loss there is no way to restore or reset the key. This article discusses various ways to store the private key of a cryptographic wallet to ensure security. For example, a key can be divided into parts and stored encrypted on hardware media, or the whole encrypted key can be stored on secure media. Quantitative data were calculated using Shamir’s scheme</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/z7u3-vp19-u74n</doi>
          <udk>004.056.55</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>key management</keyword>
            <keyword>encryption</keyword>
            <keyword>secret sharing</keyword>
            <keyword>cryptography</keyword>
            <keyword>distributed storage system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.11/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>130-137</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0007-4911-8471</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Research Institute «Kvant»</orgName>
              <surname>Samarin</surname>
              <initials>Nikolay</initials>
              <email>samarin_nik@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A method for finding errors in program code based on inmemory fuzzing</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a method of searching for errors in software based on “in-memory” code phasing. Within the framework of the method, special fragments called “points” are selected in the software code, and these “points” are subjected to phasing testing in isolation from the rest of the program code. A practical example of using the method is presented, as a result of which a memory corruption error was detected in the code</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/39tp-t61k-29uv</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>software</keyword>
            <keyword>error detection</keyword>
            <keyword>mathematical modelling</keyword>
            <keyword>symbolic execution</keyword>
            <keyword>fuzzing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.12/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>138-151</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0002-8019-437X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Altai State Technical University</orgName>
              <surname>Teplyuk</surname>
              <initials>Pavel</initials>
              <email>teplyukpavel@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-5103-3177</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Altai State Technical University</orgName>
              <surname>Yakunin</surname>
              <initials>Aleksey</initials>
              <email>almpas@list.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Identifying security flaws in the Linux kernel using system call fuzzing</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The development of operating systems built on the basis of the Linux kernel contributes to the wider use of Linux distributions as the basis of system software in information systems for various purposes, incl. being objects of critical information infrastructure. The goal of the work is to analyze the available approaches and tools for fuzzing system calls of the Linux kernel, as well as experimental fuzzing testing of some current versions of the kernel, aimed at increasing the overall security of the Linux kernel. Theoretical analysis was used to evaluate and compare existing types of Linux kernel-level vulnerabilities, as well as approaches to kernel fuzzing. An empirical research method was also used, which involved identifying defects and vulnerabilities in a certain configuration of the Linux kernel using fuzzing testing Analyzed critical vulnerabilities at the kernel level, approaches to fuzzing, including system calls, and an experimental study was conducted using the syzkaller fuzzer, which identified defects and vulnerabilities in the Linux kernel versions 4.9 and 5.4, incl. memory use-after-free vulnerability. This area of research requires further development in order to detect new vulnerabilities in current kernel versions</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pdp9-d25r-g6eu</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>operating system kernel</keyword>
            <keyword>security threats</keyword>
            <keyword>vulnerabilities</keyword>
            <keyword>fuzzing</keyword>
            <keyword>attack surface</keyword>
            <keyword>syzkaller</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.13/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>152-168</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7126-6787</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zhemelev</surname>
              <initials>Georgiy</initials>
              <email>wws.dev@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Automatic synthesis of 3D gas turbine blades shapes using machine learning</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper addresses the problem of 3D-representations and automatic synthesis of gas turbine blades shapes. First, we implemented a parametric method of descriptor-based representation using Bernstein polynomials and generalized it to produce controllable 3D-shapes. Then, we proposed a method of automatic synthesis of 3D-shapes based on the use of generative ML models for aerodynamic profiles. This method helps to reduce the number of geometric design variables used in the optimization of the aerodynamic shape of blades. Moreover, it enables automatic synthesis of 3D-shapes with representation independent of shapes level of detail. Its implementation is based on generative-adversarial network BezierGAN and makes it possible to produce arbitrary sized datasets of 3D blades having aerodynamic shapes. Finally, by interpreting and visualizing the generator’s latent space, we observed the subset of latent variables that has the most importance for rapid prototyping of gas turbine blades</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/dx8x-2he5-tffd</doi>
          <udk>004.89</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>gas turbine blade</keyword>
            <keyword>dataset</keyword>
            <keyword>3D object representation</keyword>
            <keyword>machine learning</keyword>
            <keyword>generativeadversarial network</keyword>
            <keyword>Bezier curves</keyword>
            <keyword>Bernstein polynomials</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.14/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>169-177</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0005-3102-5950</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Izotova</surname>
              <initials>Oksana</initials>
              <email>izotova@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Detection of artificially synthesized audio files using graph neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper describes a study of the problem of generalizing multimodal data in the detection of artificially synthesized audio files. As a solution to the stated problem, a method is proposed which combines simultaneous analysis of audio file characteristics with its semantic component presented in the form of text. The approach is based on graph neural networks and algorithmic approaches involving the analysis of keywords and text sentiment. The conducted experimental studies confirmed the validity and efficiency of the proposed approach</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/p6rt-uvzz-b4k7</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>deepfake</keyword>
            <keyword>graph neural networks</keyword>
            <keyword>artificially synthesized audio file</keyword>
            <keyword>text analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.15/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>178-193</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Tolgorenko</surname>
              <initials>Egor</initials>
              <email>tolgorenko.em@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zubkov</surname>
              <initials>Evgeny</initials>
              <email>zubkov.e@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Authorship identification and verification using machine and deep learning methods</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article presents research aimed at analyzing methods of text authorship identification and verification. The methods of transforming texts into vector representations and determining authorship through text classification are investigated. A dataset is formed, on which the investigated methods are tested, after which conclusions about their effectiveness are drawn. Further research directions are also proposed</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/vhgh-3g1m-996v</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>authorship verification</keyword>
            <keyword>authorship identification</keyword>
            <keyword>classification</keyword>
            <keyword>deep learning methods</keyword>
            <keyword>machine learning</keyword>
            <keyword>N-gram</keyword>
            <keyword>TF-IDF</keyword>
            <keyword>PCA</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.16.16/</furl>
          <file>2024_2_rus.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
