<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>Спецвыпуск</number>
    <altNumber> </altNumber>
    <dateUni>2025</dateUni>
    <pages>1-189</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>10-22</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-4454-327X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Prokofieva</surname>
              <initials>Anna</initials>
              <email>anna.prokofieva01@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Integration of guidance-based recovery mechanism into the learning with errors-based digital signature</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article considers modern approaches to modification of digital signature schemes on lattices. Learning with errors (LWE) problem and its modifications using hints and rounding mechanisms to reduce computational costs and decrease the signature size without compromising security are estimated. An adapted scheme using the hint mechanism and optimized rounding based on the GLYPH signature protocol is proposed. A prototype is implemented and tested, the results of which demonstrate a decrease in the average time of signature generation and verification by ~1.4 times, and a decrease in the signature size by 14 % compared to the baseline scheme.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/2hfa-tvup-b6v9</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Post-quantum cryptography</keyword>
            <keyword>Learning with Errors (LWE)</keyword>
            <keyword>hint</keyword>
            <keyword>rounding</keyword>
            <keyword>rejection sampling</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.1/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>23-33</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-0836-5920</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Samareva</surname>
              <initials>Daria</initials>
              <email>samarevadaria@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Lattice-based commitement scheme for proving linear relations over hidden values</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A hybrid lattice-based commitment scheme for anonymous proof of linear relations between hidden values is proposed. The proposed approach is based on a modification of the BDLOP zero-knowledge scheme, where Learning with Errors problem was replaced with Learning with Rounding problem, which reduced the parameter sizes and complexity of parameter sampling process. The proposed scheme retains its mathematical properties, including additive homomorphism, enabling it use for proving linear relations. The results obtained can be applied to the design of protocol of electronic voting and anonymous transactions.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/f7p4-n9p1-gtt6</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Post-quantum cryptography</keyword>
            <keyword>lattices</keyword>
            <keyword>commitment scheme</keyword>
            <keyword>zeroknowledge proof</keyword>
            <keyword>learning with rounding</keyword>
            <keyword>learning with error</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.2/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>34-47</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0006-7175-8427</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bolokan</surname>
              <initials>Amvrosii</initials>
              <email>bolokan.av@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Countering illegitimate smart voice assistant triggering</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper is about an ensuring the security of smart voice assistants against the most significant threats by reducing the number of false triggers. The paper analyses the threats to smart voice assistants and presents a list of their features. The goal is to reduce the number of unnecessary activations of smart voice assistant. An architecture and method for a custom security module that reduces false alarms are described. This security module was developed and tested with positive results.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pn2v-vnu9-z3v4</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Smart voice assistant</keyword>
            <keyword>voice biometrics</keyword>
            <keyword>dolphin attack</keyword>
            <keyword>information security threat model</keyword>
            <keyword>impersonalization</keyword>
            <keyword>white noise</keyword>
            <keyword>speech synthesis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.3/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>48-57</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-8810-6307</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bondarenko</surname>
              <initials>Timur </initials>
              <email>bondarenko.ta@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0009-5163-9975</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Piskov</surname>
              <initials>Aleksandr</initials>
              <email>brontosd2@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using entropy metrics to detect data integrity attacks in real-time</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Existing methods of detecting attacks on data integrity on file systems are investigated. A method of detecting such attacks based on the use of several entropy metrics is proposed. The efficiency of the proposed method is evaluated on the example of detection of existing ransomware.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/78up-h9mu-rmxt</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Data integrity</keyword>
            <keyword>entropy</keyword>
            <keyword>dynamic analysis</keyword>
            <keyword>ransomware</keyword>
            <keyword>encryptor</keyword>
            <keyword>driver filter</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.4/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>58-68</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9862-1507</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Dakhnovich</surname>
              <initials>Andrey</initials>
              <email>add@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0000-3249-4103</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bogina</surname>
              <initials>Vasilisa</initials>
              <email>bogina_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0008-9034-1365</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Makeeva</surname>
              <initials>Anna</initials>
              <email>makeeva.aa@edu.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Application of large language models in event forecasting field</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article presents a study on the use of large language models (LLMs) for event prediction through the application of LLM agents - autonomous systems that utilize LLMs for reasoning, decision-making, and interaction with the environment. Various architectures of LLM agents are analyzed, including cooperative systems (ChatDev, MetaGPT), multi-agent debates (MAD, ChatEval), agents for web-based tasks (WebAgent, WebVoyager), and simulation-based agents (Generative Agents, EconAgent). Special attention is given to the features of predictive modeling powered by LLMs, where traditional approaches (regression, time series) are replaced by agent-based modeling and prompt engineering. The article presents experimental results on forecasting the outcome of a selected conflict using LLM agents (Mistral, DeepSeek) and the Retrieval-Augmented Generation (RAG) approach, based on data from analytical agencies, opinion leaders, and news sources. The study identifies a convergence of predictive assessments across polarized sources and outlines key requirements for forecasting systems: weighting sources by expert relevance, filtering out neutral data, and balancing the dataset. Additionally, the article formulates criteria for selecting data to be evaluated by simulation-based LLM agents.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/xmg2-m34p-rmn3</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Artificial intelligence</keyword>
            <keyword>generative models</keyword>
            <keyword>large language models</keyword>
            <keyword>agentbased modeling</keyword>
            <keyword>social simulations</keyword>
            <keyword>LLM-agents</keyword>
            <keyword>natural language processing</keyword>
            <keyword>RAG</keyword>
            <keyword>prompt-engeneering</keyword>
            <keyword>conflict forecasting</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.5/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>69-81</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0009-0312-6243</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrenko</surname>
              <initials>Egor</initials>
              <email>egor.lavr1@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Data processing and mining to detect a data privacy violations from internal intruder in a DBMS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper is devoted to the detection of intrusions and violations regarding the confidentiality of data stored in a database based on behavioral analysis. A particular difficulty in this area is taking into account not only the query syntax, but also the semantic relationships of thedata, since syntactic and contextual approaches do not allow detecting all types of attacks. Based on the analysis of well-known studies, a method is proposed for detecting anomalies in user behavior based on author’s metrics for evaluating behavior and the coverage of requested data. The proposed method develops the well-known research, but at the same time significantly surpasses it in the task of detecting certain types of behavioral abnormalities. An important part of the work is to identify the application features of this type of analysis and its limitations.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/gr29-tnf6-db9d</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Data management systems</keyword>
            <keyword>data security</keyword>
            <keyword>data mining</keyword>
            <keyword>behavior analysis</keyword>
            <keyword>data privacy</keyword>
            <keyword>data processing</keyword>
            <keyword>anomaly detection</keyword>
            <keyword>insider detection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.6/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>82-98</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zyryanova</surname>
              <initials>Anastasiya</initials>
              <email>zyryanova.aa@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0008-4593-4444</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lyrchikov </surname>
              <initials>Alexander </initials>
              <email>lyrchikov.aa@gmail.com</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Detection of fake news spread using machine learning</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article addresses the problem of detecting unreliable news content and proposes a solution based on machine learning methods. Modern approaches to assessing the credibility of textual and multimedia content have been analyzed, promising techniques have been identified and adapted for the Russian-language media environment. A combined method for detecting fake news is proposed, based on the joint analysis of textual and multimedia data, as well as content distribution patterns. Testing of the proposed method has confirmed its effectiveness and applicability for automated detection of unreliable news content in real-world information systems.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7eua-z1tp-4pzk</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Fake news detection</keyword>
            <keyword>misinformation spreading</keyword>
            <keyword>machine learning</keyword>
            <keyword>text analysis</keyword>
            <keyword>news content filtering</keyword>
            <keyword>news classification</keyword>
            <keyword>natural language processing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.7/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>99-111</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-4593-4444</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lyrchikov </surname>
              <initials>Alexander </initials>
              <email>lyrchikov.aa@gmail.com</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9862-1507</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Dakhnovich</surname>
              <initials>Andrey</initials>
              <email>add@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">An automated method for assessing the correctness of distributed algorithms using chaos engineering testing</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In the paper a method for assessing the correctness of distributed algorithms using chaos engineering techniques to enhance their testing efficiency is presented. An analysis of current research in the field of testing distributed systems - such as federated learning systems for Large Language Models (LLMs) - and chaos engineering is provided. Existing chaos engineering-based testing methods and tools are analyzed, and their shortcomings are identified. As a result, a method for assessing the correctness of distributed systems through chaos engineering testing has been developed; vulnerability testing in open-source projects was conducted, including a comparison with existing approaches. The obtained results confirm the effectiveness of the proposed method.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ed6x-521z-23h7</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Testing</keyword>
            <keyword>chaos engineering</keyword>
            <keyword>fuzzing LLM</keyword>
            <keyword>federated learning</keyword>
            <keyword>distributed algorithms</keyword>
            <keyword>distributed systems</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.8/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>112-123</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-7009-2265</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anoshkin</surname>
              <initials>Ilya </initials>
              <email>ilya.anoschkin@outlook.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Automated security analysis of software for the Android operating system</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents methods of automated security analysis of Android applications, which can be used to search for cryptographic vulnerabilities, vulnerabilities of third-party software components, authentication, authorization, as well as to detect the storage and transmission of sensitive information in plaintext. The accuracy of search for the given types of vulnerabilities by means of automated vulnerability search and software prototype is analyzed.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/6h6a-6kzh-84g3</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Android</keyword>
            <keyword>vulnerability scanning</keyword>
            <keyword>dynamic instrumentation</keyword>
            <keyword>security standard</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.9/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>124-133</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0006-6856-2108</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pahomov</surname>
              <initials>Maksim</initials>
              <email>pahomov_ma@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">The architecture of a software package for wireless ad-hoc network protection from active network attacks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Software solutions for active network attack detection and prevention on wireless ad-hoc networks have been analyzed. The requirements for the architecture of a software system designed to protect wireless ad-hoc networks from active network attacks have been formulated. The architecture meeting the requirements is proposed. A software prototype has been developed that implements the proposed solution, and its evaluation has been performed.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/frpt-96b9-rn4t</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information security</keyword>
            <keyword>ad-hoc networks</keyword>
            <keyword>network attack prevention</keyword>
            <keyword>intrusion detection systems</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.10/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>134-144</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-2356-7487</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Prisich</surname>
              <initials>Maria</initials>
              <email>prisichma@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-0374-4649</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bezborodko</surname>
              <initials>Anastasia</initials>
              <email>nsspbpoly@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">The use of convolutional neural networks to enhance the security of steganographic methods</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes the approach to increase the secrecy of steganography methods in images using convolutional neural networks (CNN). CNNs are integrated into the data embedding process and allow you to minimize the traces of concealment that can be detected by stegoanalyzers. Two implementation options are considered: based on the least significant bit (LSB) and discrete cosine transform (DCT) methods, and also their modifications using CNN. The task of ensuring the secrecy and reliability of embedding was solved in stages: the visual quality of the images, the reliability of message extraction and the resistance to detection by classical methods of stegoanalysis were analyzed. The results of quality and secrecy assessment experiments have confirmed the effectiveness of the proposed approach.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/du6k-pfkx-7ngv</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Steganography</keyword>
            <keyword>LSB</keyword>
            <keyword>DCT</keyword>
            <keyword>machine learning</keyword>
            <keyword>convolution neural networks</keyword>
            <keyword>stegoanalysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.11/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>145-155</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0000-5788-8619</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Rochman</surname>
              <initials>Nikita</initials>
              <email>nik.roxman@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-0374-4649</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bezborodko</surname>
              <initials>Anastasia</initials>
              <email>nsspbpoly@gmail.com</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Hiding data in audio files using coverless steganography methods</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a coverless steganographic approach for hiding data in audio files. It is based on an architecture that includes the generative neural network model RealNVP for processing streaming data and auxiliary encoding and decoding modules. Piano-jazz was chosen as a musical genre for generating audio files. The results of experimental studies have confirmed the effectiveness of using streaming neural networks for the tasks of coverless steganography in audio files.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1ng9-14k5-a587</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Steganography</keyword>
            <keyword>coverless steganography</keyword>
            <keyword>generative model</keyword>
            <keyword>RealNVP model</keyword>
            <keyword>audio file generation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.12/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>156-167</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0007-2389-0789</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Fokina</surname>
              <initials>Sofia</initials>
              <email>sofiya.fockina@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Yakovleva</surname>
              <initials>Polina</initials>
              <email>iakovleva.polina16@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-6695-2328</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Garkushev</surname>
              <initials>Alexander</initials>
              <email>sangark@mail.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0009-0001-8806-787X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Morozova</surname>
              <initials>Anna</initials>
              <email>amorozova94@gmail.com</email>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Information model for countering the illegal distribution of personal data in information systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article presents an information model for ensuring the security of personal data in information systems, based on the Secure Remote Password protocol and Russian cryptographic algorithms GOST R34.12-2015 (“Kuznechik”) and GOST 34.11-2018 (“Stribog”). An analysis of threats and vulnerabilities of the information systems, the regulatory framework and modern methods of protecting personal data is carried out. A modular software implementation has been developed that is resistant to the main types of attacks, including traffic interception, man-in-the-middle attacks and database leaks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1pk8-r79m-xm3m</doi>
          <udk>004.65</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Personal data</keyword>
            <keyword>information security</keyword>
            <keyword>SRP protocol</keyword>
            <keyword>cryptographic algorithms</keyword>
            <keyword>MITM-attacks</keyword>
            <keyword>data protection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.13/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>168-178</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Tsibulskas</surname>
              <initials>Konstantin</initials>
              <email>tsibulskas_ka@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Ensuring the stability of online learning artificial intelligence systems based on model similarity assessment</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper studies the problem of protecting artificial intelligence systems with online learning from poisoning attacks. To improve the stability, an approach is proposed based on assessing the similarity of the operation of two computational models: the reference (initial) and the operational (test). The following indicators of stability violation were identified: a decrease in the total accuracy (TA), total prediction value (TPV), and a decrease in the cosine similarity of model weights (cos_similarity). As a result of experimental study, it was found that the proposed solution allows for timely detection of poisoned data, maintaining high classification accuracy during targeted attacks on the computational model, which is further trained on test data.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ad7f-mgh1-urdh</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Poisoning attack</keyword>
            <keyword>artificial intelligence security</keyword>
            <keyword>online learning</keyword>
            <keyword>model similarity assessment</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.14/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>179-188</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0009-7468-2511</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Yudin</surname>
              <initials>Sergey</initials>
              <email>yudin.sa@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Semenov</surname>
              <initials>Pavel</initials>
              <email>semenov_po@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0008-4442-5365</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kubrin</surname>
              <initials>Georgiy</initials>
              <email>kubrin@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Automating of container images security scanning and analysis</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The structure and composition of container images, as well as the related security issues, are analyzed. The existing scanning methods for detecting vulnerabilities in container images are analyzed, their advantages and disadvantages are highlighted. An approach addressing the identified shortcomings is proposed. A software prototype of an automated security scanning system for container images with support for dynamic monitoring is developed and tested.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kg63-a9kb-r12f</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Containers</keyword>
            <keyword>container images</keyword>
            <keyword>container image vulnerability scanners</keyword>
            <keyword>Docker</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.22.15/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
