<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>1</number>
    <altNumber> </altNumber>
    <dateUni>2021</dateUni>
    <pages>1-134</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-19</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Data structures formation in active security monitoring tasks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The trend towards automation of security management processes, including in industrial cyber-physical systems, has led to a change in the role of information security monitoring from solving the problem of conformity assessment to ensuring timely awareness of security management methods - active monitoring. The paper is devoted to the formation of requirements for the subsystem of data collection and processing of information security active monitoring. The author systematizes a number of cyber-physical systems security management tasks, considers examples of methods for solving them, and identifies data structures that are in demand by these methods</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>security monitoring</keyword>
            <keyword>security control</keyword>
            <keyword>industrial cyber-physical systems</keyword>
            <keyword>data preparation</keyword>
            <keyword>data structuring</keyword>
            <keyword>data engineering</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.1/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>20-30</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Ageev</surname>
              <initials>S.</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Ageeva</surname>
              <initials>N.</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Karetnikov</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>Privalov</surname>
              <initials>A.</initials>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Algorithm for rapid detection of traffic anomalies in high-speed corporate multiservice communication networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper an adaptive heuristic (behavioral) algorithm for detecting traffic anomalies in high-speed corporate multiservice communication networks, functioning in real time. The main results of his research are presented</abstract>
        </abstracts>
        <codes>
          <udk>681.142.33.681.14</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>pseudogradient algorithm</keyword>
            <keyword>conditionally nonlinear pareto optimal filtering</keyword>
            <keyword>fuzzy logical takagi — sugeno conclusion</keyword>
            <keyword>fuzzy rule base</keyword>
            <keyword>fuzzy knowledge base</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.2/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>31-38</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-4442-5365</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kubrin</surname>
              <initials>Georgiy</initials>
              <email>kubrin@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-8206-2915</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Denis </initials>
              <email>ivanov@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Dynamic phishing website dataset collection</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper describes a list of deficiencies in the publicly available datasets of phishing websites. A method is proposed that mitigates those deficiencies. A prototype is described and the results which was successfully used to create a dataset of phishing site archives. Created dataset does not contain described deficiencies</abstract>
        </abstracts>
        <codes>
          <udk>004.056.57</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>phishing site detection</keyword>
            <keyword>machine learning</keyword>
            <keyword>website archiving</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.3/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>39-49</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of ultra-high volumes of network traffic based on quantum machine learning</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents a method for analyzing network traffic based on the use of quantum machine learning. A method for encoding network traffic in terms of a quantum computer has been developed. The results of experimental studies have shown the superiority of the proposed approach over traditional machine learning methods in detecting network attacks</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>network traffic analysis</keyword>
            <keyword>quantum computer</keyword>
            <keyword>quantum machine learning</keyword>
            <keyword>qubit</keyword>
            <keyword>network attacks</keyword>
            <keyword>intrusion detection system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.4/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>50-54</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Marshev</surname>
              <initials>I.</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-7321-7430</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zhukovskii </surname>
              <initials>Evgeniy </initials>
              <email>bugaev.va@edu.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Protection against adversarial attacks on malicious executable detection methods using machine learning algorithms</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Strength of malware detection methods based on machine learning algorithms has been analyzed. Adversarial attack for given methods has been developed. The method of robustness improvement of vulnerability detection methods has been proposed</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>malware detection</keyword>
            <keyword>classification</keyword>
            <keyword>machine learning</keyword>
            <keyword>adversarial attack</keyword>
            <keyword>neural network</keyword>
            <keyword>static analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.5/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>55-61</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Nefedov</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kriulin</surname>
              <initials>Artur</initials>
              <email>kriulin@mirea.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-5511-4000</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Eremeev</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Approach to detect maliscous servers on anonimous network TOR based on clasterization methods</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper deals with the issues of ensuring the security of communications on the Internet, anonymous access to network resources. The problem situation is revealed, which consists in increasing the probability of deanonymization of users of the TOR network when using servers under a single administrative management in the same chain. An approach to identifying «hidden groups» of TOR anonymous network servers is proposed by analyzing the frequency of server characteristics and clustering them based on the similarity measure. The conducted research allowed us to identify ways to improve the software of the TOR anonymous network and improve the security of users</abstract>
        </abstracts>
        <codes>
          <udk>004.7 + 004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>computer networks</keyword>
            <keyword>anonymous communication</keyword>
            <keyword>anonymous networks</keyword>
            <keyword>TOR network</keyword>
            <keyword>clustering</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.6/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>62-78</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Stepanov</surname>
              <initials>M.</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Detection of network attacks in software-defined networks using isolating forest algorithm</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper proposes an approach for detecting network attacks in software-defined networks. The specifics of such networks in terms of security are taken into account, and a modified isolating forest algorithm is taken as the basis for the developed approach. The results of experimental studies where the optimal parameters of the isolating forest algorithm and the extended algorithm of the isolating forest are chosen are presented. Based on the results of the studies, a conclusion is made about the effectiveness of the isolating forest for network attack detection in software-defined networks</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>software-defined network</keyword>
            <keyword>network attacks</keyword>
            <keyword>isolation forest algorithm</keyword>
            <keyword>extended isolation forest algorithm</keyword>
            <keyword>networks attack detection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.7/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>79-85</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zavadskii</surname>
              <initials>Evgeniy </initials>
              <email>zavadskij_ev@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-8206-2915</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Denis </initials>
              <email>ivanov@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Countering information threats using honeypot systems based on graph of potential attacks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In this paper, we propose a method for dynamic resource management of a Honeypot-system based on a graph of potential attacks to enable the deployment of a virtual network infrastructure of any scale, according to which a virtual network infrastructure in conditions of limited computing resources changes its configuration, adapting to the actions of an attacker</abstract>
        </abstracts>
        <codes>
          <udk>004.94</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>network infrastructure</keyword>
            <keyword>hybrid honeypot-system</keyword>
            <keyword>deception</keyword>
            <keyword>potential attack graph</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.8/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>86-95</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-1399-1822</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Shenets </surname>
              <initials>Nikolay</initials>
              <email>shenets_nn@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Petushkov</surname>
              <initials>A.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">New regular sliding window algorithms for elliptic curve scalar point multiplication</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Simple side-channel attacks on the implementation of elliptic curve scalar point multiplication algorithms are considered. New regular sliding window algorithms for calculating multiple points are proposed. Their optimal parameters are evaluated. The efficiency of the proposed algorithms is investigated</abstract>
        </abstracts>
        <codes>
          <udk>004.056.53 (003.26)</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>side-channel attack</keyword>
            <keyword>elliptic curve scalar point multiplication</keyword>
            <keyword>regular algorithm</keyword>
            <keyword>sliding window algorithm</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.9/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>96-101</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1736-7178</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anisimov</surname>
              <initials>Vladimir</initials>
              <email>an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-6527-2352</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peoples’ Friendship University of Russia named after Patrice Lumumba</orgName>
              <surname>Anisimov</surname>
              <initials>Evgeny</initials>
              <email>anis.an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>Saurenko</surname>
              <initials>Tatyana</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Efficiency of computer network functioning in conditions of malicious information influences</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a model for predicting the dynamics of a generalized indicator of the efficiency of the functioning of a corporate computer network in conditions of harmful information influences. The model is based on the representation of its dynamics in the form of a function of the level of performance of the corporate network at each moment of time from the specified interval. In this case, the level of network operability is determined by the operability of its elements and is described by an appropriate system of differential equations that take into account harmful effects and the process of eliminating their consequences. For these equations, under some simplifying conditions, analytical solutions are constructed, which greatly facilitates the process of forecasting the dynamics of the generalized efficiency indicator under consideration</abstract>
        </abstracts>
        <codes>
          <udk>004.056.57</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>corporate computer network</keyword>
            <keyword>functioning</keyword>
            <keyword>harmful information impacts</keyword>
            <keyword>generalized efficiency indicator</keyword>
            <keyword>dynamics</keyword>
            <keyword>forecast</keyword>
            <keyword>model</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.10/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>102-108</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-4866-217X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Gryzunov</surname>
              <initials>Vitaly</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Conceptual model of geoinformation system adaptive control under conditions of destabilization</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A conceptual model of a geoinformation system operating under conditions of destabilization is proposed. Destabilizing factors are of a deterministic, stochastic and non-stochastic nature. The geographic information system is considered as a control object with a variable structure, the problem of adaptation to destabilization is formulated</abstract>
        </abstracts>
        <codes>
          <udk>004.27+004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>geographic information system</keyword>
            <keyword>destabilizing factors</keyword>
            <keyword>information security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.11/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>109-116</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Fatin</surname>
              <initials>Aleksander</initials>
              <email>sasha-fatin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using the NEAT-hypercube mechanism for cyberattack detection in Internet of Things</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In this paper, we consider a method for detecting abnormal behavior in the operation of cyber-physical systems, the Internet of Things (IoT) and distributed control systems using the prediction and analysis of multidimensional time series using neuroevolutionary algorithms based on the development of the hypercube substrate. The method is based on identifying deviations between the current values of the state of the cyber-physical system and the predicted results. The results of studies of the described method are presented, demonstrating the correctness and accuracy of this approach</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>cyber-physical systems</keyword>
            <keyword>IoT</keyword>
            <keyword>hypercube</keyword>
            <keyword>neat</keyword>
            <keyword>neuroevolution</keyword>
            <keyword>multivariate timeset</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.12/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>117-130</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Vasileva</surname>
              <initials>Ksenia</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Anomaly detection in cyber-physical systems using graph neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes the application of convolutional graph neural networks to detect anomalies in cyber-physical systems, developed a graph model reflecting the dynamics of changes in the state of devices, presented an algorithm for data preprocessing, which provides the formation of the graph based on the studied sample of telemetry values. The optimal parameters of the neural network were established experimentally, the applicability and effectiveness of the proposed model for detecting anomalies in cyber-physical systems were shown, and the ability of the model to detect and distinguish between classes of attacks was confirmed</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>graph neural networks</keyword>
            <keyword>cyber-physical system</keyword>
            <keyword>anomaly detection; convolutional neural networks</keyword>
            <keyword>information security</keyword>
            <keyword>telemetric data analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.13/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>131-137</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9862-1507</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Dakhnovich</surname>
              <initials>Andrey</initials>
              <email>add@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Security through obscurity in industrial Internet of Things</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">One of the major problems in the Industrial Internet of Things cybersecurity is to provide availability of operation processes, in the other words, “cyber sustainability”. The survey describes actual the Industrial Internet of Things network-level cybersecurity issues that could be mitigated by appliance of “Security through obscurity” approach on the very edge of the Industrial Internet of Things cybersecurity. In the end, authors try to evaluate cybersecurity of the Industrial Internet of Things systems through an anonymity measure. Thus, availability and anonymity terms are tried to be connected</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>digital manufacturing</keyword>
            <keyword>cybersecurity</keyword>
            <keyword>industry 4.0</keyword>
            <keyword>industrial Internet of Things</keyword>
            <keyword>critical information infrastructure</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.2.14/</furl>
          <file>2021_1-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
