<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>3</number>
    <altNumber> </altNumber>
    <dateUni>2025</dateUni>
    <pages>1-213</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-19</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-8206-2915</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Denis </initials>
              <email>ivanov@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-2463-3876</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Gavrichkov</surname>
              <initials>Daniil </initials>
              <email>gavrichkov.da@edu.spbstu.ru</email>
              <address>Peter the Great St. Petersburg Polytechnic University</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Fuzzing of closed-source software using large language models</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The architecture of large language models and their potential application for automating fuzzing testing of software are investigated. As a result of this study, a method enabling automated fuzzing testing for graphical interface applications on the Windows operating system. A software prototype was created to realize the proposed method and subjected to testing.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/fkpp-54ek-az1a</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Automated fuzzing testing</keyword>
            <keyword>large language models</keyword>
            <keyword>graph representation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.1/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>20-29</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0004-1271-709X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ognev</surname>
              <initials>Roman </initials>
              <email>ognev_ra@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Generalized method for comparative analysis of fuzz testing tools</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A systematic analysis of fuzzing evaluation methodologies has been conducted. A minimal yet comprehensive metric set – branch coverage, unique crash count, and time-to-first-crash – has been identified. A normalized aggregate indicator is proposed that enables post-hoc comparison of different tools without reruns.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rhtx-2n4n-dm6t</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Fuzzing</keyword>
            <keyword>fuzzing metrics</keyword>
            <keyword>Large Language Models (LLM)</keyword>
            <keyword>vulnerability detection</keyword>
            <keyword>fuzz testing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.2/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>30-39</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0004-3025-261X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Mikhail </initials>
              <email>ivanov2.ms@edu.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of methods for detecting malicious software using large language models and eBPF technology</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A review of malware detection software tools using large language models and eBPF technology has been performed. For each tool under consideration, a brief description is provided, as well as its advantages and disadvantages. The results of a comparative analysis of the considered tools are presented, which make it possible to identify research areas in the field under consideration that require the most attention.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/bx59-dfz8-adbv</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information security</keyword>
            <keyword>malware</keyword>
            <keyword>Android</keyword>
            <keyword>LLM</keyword>
            <keyword>eBPF</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.3/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>40-54</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-5757-381X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Emperor Alexander I St. Petersburg State Transport University</orgName>
              <surname>Gofman</surname>
              <initials>Maksim </initials>
              <email>gofman@moonmail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>7006566675</scopusid>
              <orcid>0000-0002-6076-7241</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Emperor Alexander I St. Petersburg State Transport University</orgName>
              <surname>Kornienko</surname>
              <initials>Anatoliy</initials>
              <email>kaa.pgups@yandex.ru</email>
              <address>Russia, 190031, St. Petersburg, Moskovsky ave., 9</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A method for predicting the correlation properties of marker bipolar sequences using digital watermarking by the patchwork method</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article develops theoretical justifications and presents simulation results confirming the key influence of expanding bipolar sequences on the correlation properties of marker (expanded) bipolar sequences. Specifically, the article develops a method for predicting the values of the normalized autocorrelation function of an expanded (marker) bipolar sequence, and specifies the conditions for achieving high prediction accuracy. The article also proves the existence of a connection between the properties and characteristics of the mutual correlation function between the sought-after (embedded) marker sequence and distorted (by noise or attacks) sequence and the properties of the autocorrelation function of the embedded marker sequence. Finally, the article concludes with the formulation of indicators and criteria for the robustness of expanding and marker (extended) bipolar sequences.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/e4d3-afn7-x99z</doi>
          <udk>519.876.5:519.6:004.357</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Steganography</keyword>
            <keyword>digital watermarking</keyword>
            <keyword>bipolar sequences</keyword>
            <keyword>pseudo-random sequences</keyword>
            <keyword>information security</keyword>
            <keyword>copyright protection</keyword>
            <keyword>patchwork method</keyword>
            <keyword>autocorrelation function</keyword>
            <keyword>mutual correlation function</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.4/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>55-68</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0005-6983-8017</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI</orgName>
              <surname>Mandrov</surname>
              <initials>Aleksandr </initials>
              <email>sashamandrovp@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0007-8532-3640</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI</orgName>
              <surname>Kravchenko</surname>
              <initials>Nikita</initials>
              <email>nik.kravchenko.2004@bk.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>55229487100</scopusid>
              <orcid>0000-0002-4429-8799</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)</orgName>
              <surname>Zhukov</surname>
              <initials>Igor</initials>
              <email>i.zhukov@inbox.ru</email>
              <address>Russia, 115409, Moscow, Kashirskoe shosse, 31</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0009-0004-0370-1379</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI</orgName>
              <surname>Balashova</surname>
              <initials>Ekaterina </initials>
              <email>ekatherina04@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Building a semantic space of intentions using generative pre-trained models for solving the spam filtering task</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">One of the key elements in solving spam message filtering is the text vectorization method. The article proposes a vectorization approach based on matching text to pairs of intentions. A list of intention pairs was identified and a synthetic dataset of textual utterances was generated. A neural network was designed and trained to determine the degree of belonging of each intention to the text expression at the model input. The developed method was tested on the spam message filtering task using logistic regression and the Enron dataset and SMS dataset</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rk44-9aab-nxha</doi>
          <udk>004.81</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Transformers</keyword>
            <keyword>DistilBert</keyword>
            <keyword>PCA</keyword>
            <keyword>neural networks</keyword>
            <keyword>synthetic data</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.5/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>69-80</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2273-725X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Rostov State University of Economics</orgName>
              <surname>Lapsar</surname>
              <initials>Aleksey</initials>
              <email>lapsar1958@mail.ru</email>
              <address>Russia, 344000, Rostov-on-Don, Bolshaya Sadovaya str., 69</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0007-7981-1146</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Rostov State University of Economics</orgName>
              <surname>Chizhevsky </surname>
              <initials>Maxim</initials>
              <email>ch.inc@yandex.ru</email>
              <address>Russia, 344000, Rostov-on-Don, Bolshaya Sadovaya str., 69</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-5583-4972</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Rostov State University of Economics</orgName>
              <surname>Serpeninov </surname>
              <initials>Oleg</initials>
              <email>serpeninov53@mail.ru</email>
              <address>Russia, 344000, Rostov-on-Don, Bolshaya Sadovaya str., 69</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Optimization of computer incident investigation algorithm in SIEM systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In the context of increasing frequency and complexity of cyberattacks, effective incident investigation has become a priority task in ensuring organizational information security. One of the key challenges in using SIEM systems for investigating computer incidents is the lack of formalized algorithmic approaches to the processing and analysis of security events. To address this issue, an algorithm has been developed to optimize the actions of specialists when analyzing suspicious activity in information systems. The algorithm covers the key stages of investigation – from event verification to the analysis of potential intruder actions. The results of the study demonstrate that formalizing investigation processes contributes to more effective incident response and reduces the time required for their resolution.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rmzt-68hn-ung8</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Incident investigation algorithm</keyword>
            <keyword>information security</keyword>
            <keyword>SIEM systems</keyword>
            <keyword>event analysis</keyword>
            <keyword>incident response</keyword>
            <keyword>cybersecurity</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.6/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>81-90</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Vasiliev</surname>
              <initials>Oleg </initials>
              <email>vasiliev_os@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Ensuring byzantine fault tolerance of a distributed ledgers in a smart city based on a trust model</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper examines the problem of ensuring Byzantine fault tolerance in smart city distributed ledger systems. To improve the security of distributed ledgers, it is proposed to use the hashgraph distributed consensus protocol, in which events are organized as a directed acyclic graph, and nodes exchange “gossip about gossip”. The traditional hashgraph protocol has been supplemented with the developed trust model that reduces the impact of malicious devices when reaching consensus in digital infrastructures of a smart city.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/39ak-3h78-b99n</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Byzantine fault tolerance</keyword>
            <keyword>consensus</keyword>
            <keyword>trust model</keyword>
            <keyword>directed acyclic graph</keyword>
            <keyword>distributed ledger</keyword>
            <keyword>node reputation</keyword>
            <keyword>smart city</keyword>
            <keyword>DAG</keyword>
            <keyword>hashgraph</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.7/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>91-99</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zavadskii</surname>
              <initials>Evgeniy </initials>
              <email>zavadskij_ev@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Cybersecurity of the functional network of critical infrastructure facilities using the strategy of optimal placement of Honeypot nodes</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article considers the problem of dynamic management of a protection system based on Honeypot technology. To solve this problem, a method is proposed to reduce the requirements for computing resources and a function for assessing the criticality and risk of compromising nodes of the functional network infrastructure, the use of which allows taking into account the peculiarities of the implementation of technological processes and the dynamics of attack development.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/tp88-3x44-g92n</doi>
          <udk>004.94</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Network security</keyword>
            <keyword>Honeypot</keyword>
            <keyword>multicriteria optimization</keyword>
            <keyword>dynamic network</keyword>
            <keyword>cyberattack</keyword>
            <keyword>graph model</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.8/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>100-109</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7199-6384</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Special Technology Center LLC</orgName>
              <surname>Kurakin</surname>
              <initials>Alexander </initials>
              <email>akurakin@stc-spb.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method of dynamic distribution of access rights in an autonomous group of robotic systems based on genetic algorithms</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A method for delimiting access rights in a group of heterogeneous robotic systems is proposed based on the concept of a virtual squad, considering their information interaction, based on a genetic algorithm. The essence of the method is that when using a role model for delimiting the rights of access of a subject to an object – the goal of a work task, the model of delimiting access rights is updated to exclude a collision. To change the parameters of the model, the roles are presented as a set of binary data that form a chromosome of the initial population, which changes based on a genetic algorithm when the current situation changes during the work task. Modeling is carried out and the results of numerical studies are presented in comparison with the solution of the problem by the Hungarian algorithm.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/v4hu-91h9-5m6m</doi>
          <udk>004.021</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Grouping of robotic systems</keyword>
            <keyword>dynamic distribution method</keyword>
            <keyword>algorithm</keyword>
            <keyword>mission</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.9/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>110-120</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0005-6662-5606</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Velichko</surname>
              <initials>Ivan</initials>
              <email>wwr0ngn4m3@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">From exploitation to protection: analysis of methods for defending against attacks on LLMS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Modern large language models demonstrate impressive capabilities but remain vulnerable to attacks that can manipulate their behavior, extract confidential data, or bypass built-in restrictions. This paper focuses on methods for protecting language models from prompt injection attacks, which allow adversaries to exploit the system for malicious purposes. Various defense strategies are examined and analyzed, including query filtering, context isolation, training on perturbed data, and other approaches. A comparative analysis of the effectiveness of defense mechanisms is conducted, highlighting their limitations and identifying future directions for enhancing the security of language models.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/2nkk-unee-uuzv</doi>
          <udk>004.056.52</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Large language models</keyword>
            <keyword>artificial intelligence</keyword>
            <keyword>adversarial attacks</keyword>
            <keyword>defense methods</keyword>
            <keyword>model output manipulation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.10/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>121-146</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Matuhina</surname>
              <initials>Ekaterina </initials>
              <email>matyuhina@mirea.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-7231-5728</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Spirin</surname>
              <initials>Andrey </initials>
              <email>spirin_aa@mirea.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0004-0833-5574</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Ikonnikov</surname>
              <initials>Aleksandr </initials>
              <email>alx.ikona@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Cluster analysis of vector representations of malicious query language models: comparison of methods of obtaining embeddings based on character N-grams, individual words a nd whole sentences</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This study presents a comparative analysis of tokenization strategies and text vectorization methods for detecting harmful jailbreak prompts submitted to large language models. Using a dataset of both benign and malicious queries, three approaches were evaluated: aggregated embeddings of character-level N-grams, aggregated word-level embeddings, and semantic representations of entire prompts. The results show that token-based methods achieve a high recall of malicious prompts by capturing repetitive local patterns, though often at the cost of increased false positives. In contrast, semantic embeddings of full prompts provide high precision in detecting threats, but may overlook obfuscated or rare attacks. A key finding of this work is that vector representations demonstrate clear cluster separation between benign and harmful prompts, making it possible to apply lightweight classification algorithms for effective filtering, especially in systems with limited computational resources. The study also supports a two-stage protection framework, where clustering is used as a preliminary filter, and only suspicious inputs proceed to deeper analysis. In some configurations, the approach successfully identified up to 96 % of jailbreak prompts, confirming its practical relevance for integration into large language model access pipelines.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5ua4-umte-db1n</doi>
          <udk>004.056.5, 004.85:004.89, 519.237.8</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Language models</keyword>
            <keyword>text tokenization</keyword>
            <keyword>semantic embeddings</keyword>
            <keyword>clustering of vector representations</keyword>
            <keyword>filtering of malicious requests</keyword>
            <keyword>bypassing model restrictions</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.11/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>147-164</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-3830-1840</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Yugai</surname>
              <initials>Pavel </initials>
              <email>yugaj_pe@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Research of adversarial attacks on classical machine learning models in the context of network threat detection</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This study presents an investigation of adversarial attacks on classical machine learning algorithms within the context of network threat detection. It offers an overview of the machine learning models employed for various tasks in the realm of computer network security. A formal description of the threat model is provided, along with a classification of adversarial attacks. The classification of network traffic within the WEB-IDS23 dataset is carried out using classical machine learning models, including k-nearest neighbors, random forest, and support vector machine. Implemented adversarial attacks include the Fast Gradient Sign Method, Projected Gradient Descent, the Carlini and Wagner attack, and DeepFool, applied to these machine learning algorithms. An analysis of the impact of the deployed adversarial attacks on the aforementioned classical machine learning algorithms is conducted.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/xerr-dfhh-2zak</doi>
          <udk>004.89</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Adversarial attacks</keyword>
            <keyword>machine learning</keyword>
            <keyword>network threats</keyword>
            <keyword>Fast Gradient Sign Method</keyword>
            <keyword>Projected Gradient Descent</keyword>
            <keyword>Carlini and Wagner attack</keyword>
            <keyword>k-nearest neighbors</keyword>
            <keyword>support vector machine</keyword>
            <keyword>random forest</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.12/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>165-179</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Optimization of data obfuscation in big data processing and storage systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper is devoted to the task of reducing the attack surface from an internal attacker in heterogeneous big data processing and storage systems by choosing the optimal method of data obfuscation based on anonymization (depersonalization) technologies. The paper analyzes terminology and systematizes data hiding methods to reduce the attack surface in big data processing and storage systems. A formal formulation of the problem of finding the optimal method of data obfuscation and an algorithm for solving it over various types of datasets are proposed, taking into account evaluation criteria specific to each class of methods. The implementation of a software prototype to support decision-making and the choice of the optimal method for solving practical problems is described, experimental approbation and analysis of its results are carried out.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/693e-m24n-96zh</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Big data security</keyword>
            <keyword>big data management systems</keyword>
            <keyword>data privacy</keyword>
            <keyword>data obfuscation</keyword>
            <keyword>data anonymization</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.13/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>180-191</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-5606-7509</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Mironkin</surname>
              <initials>Vladimir </initials>
              <email>mironkin.v@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>National Research University Higher School of Economics</orgName>
              <surname>Yurasov</surname>
              <initials>Nikita</initials>
              <email>n.yurasov@yahoo.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">On the question of the applicability of the statistics of the measure “chi-square” in the problem of determining the parameters of block encryption algorithms</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article presents the results of the practical application of statistical methods for analyzing block encryption algorithms operating in the ECB encryption mode. In particular, in cases of incorrect use of plaintext encoding algorithms, it is established that it is possible to determine the block size of encryption algorithm based on the analysis of chi-square statistics calculated on the available ciphertext volume.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/3p1p-bx2v-prru</doi>
          <udk>004.056.55</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Block encryption algorithm</keyword>
            <keyword>encryption mode</keyword>
            <keyword>ECB mode</keyword>
            <keyword>statistics</keyword>
            <keyword>criterion</keyword>
            <keyword>chi-squared distribution</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.14/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>192-212</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-9694-2348</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian Presidential Academy of National Economy and Public Administration (RANEPA)</orgName>
              <surname>Biryukova </surname>
              <initials>Anastasiya</initials>
              <email>nastyabir1010@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1300-2470</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Mozhaysky Military Space Academy</orgName>
              <surname>Biryukov</surname>
              <initials>Denis</initials>
              <email>Biryukov.D.N@yandex.ru</email>
              <address>Russia, 197198, St. Petersburg, Zhdanovskaya str., 13</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Global practices in regulating and implementing generative artificial intelligence in higher education</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article analyzes international recommendations for the application of generative artificial intelligence (AI) in higher education over the past five years. It identifies key trends, ethical challenges, and strategies for integrating AI technologies into academic practices. The study focuses on the tensions between AI’s innovative potential (e. g., personalized learning, automation of routine tasks) and associated risks (e. g., academic dishonesty, digital inequality). Regulatory initiatives, such as the EU AI Act, China’s AI standards, and developers’ ethical declarations, are examined alongside successful implementation practices, including MIT’s adaptive learning platforms and SberUniversity’s AI-driven digital assistants. Key findings emphasize: the need to balance technological progress with ethical norms, including mandatory AI-generated content labeling and the promotion of AI literacy; the importance of global standards to overcome legal fragmentation and bridge the digital divide. Recommendations for universities: phased AI integration, infrastructure investments, and staff training programs. The study contributes to shaping strategies for adapting higher education to the era of generative AI, highlighting universities’ role as drivers of responsible technology adoption. The findings are relevant for university administrators, policymakers, and EdTech developers.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/hz8x-hdxv-b83d</doi>
          <udk>004.8:378.147</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Generative artificial intelligence</keyword>
            <keyword>higher education</keyword>
            <keyword>cybersecurity</keyword>
            <keyword>academic integrity</keyword>
            <keyword>personalized learning</keyword>
            <keyword>AI ethics</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.23.15/</furl>
          <file>pib_3_5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
