<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>4</number>
    <altNumber> </altNumber>
    <dateUni>2025</dateUni>
    <pages>1-184</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-22</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0000-3249-4103</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bogina</surname>
              <initials>Vasilisa</initials>
              <email>bogina_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Borisov</surname>
              <initials>Georgiy</initials>
              <email>borisov.gi@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0004-8242-2764</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg Electrotechnical University “LETI”</orgName>
              <surname>Bratko</surname>
              <initials>Victor</initials>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0001-9862-1507</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Dakhnovich</surname>
              <initials>Andrey</initials>
              <email>add@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of the applicability of large language models to the simulation of realistic dialogues for the purpose of simulating social engineering attacks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The given research is aimed at checking whether synthetic-generated dialogues by LLMs between an “adversary” and a “victim” represent plausibility. To check the credibility of our results, we chose the method of verification using open-source data from U.S. and Russian reports. The actors of dialogues (LLM-agents) were given synthetically generated biographical and personal data, set using prompt engineering techniques, specifically the Persona Pattern. Data from the experiment show a high level of stability and plausibility consistent with ongoing trends in the sphere of social engineering research. Thus, it proves that it is possible to simulate realistic interaction within societal cells with the final goal of computational recreation of social engineering attacks and other related fields using LLMs.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kfvm-3811-vmk4</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>LLM-agents</keyword>
            <keyword>dialogue simulation</keyword>
            <keyword>social engineering</keyword>
            <keyword>prompting techniques</keyword>
            <keyword>agent-based modeling</keyword>
            <keyword>social modeling</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.1/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>23-34</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0004-4143-7302</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National University of Oil and Gas «Gubkin University»</orgName>
              <surname>Sintsov</surname>
              <initials>Mikhail</initials>
              <email>sinzovmi@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Determining the optimal response time to information security threats in a limited resource environment</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In research proposed an approach in which the total time of detection, analysis and response to the actions of an attacker does not tend to a minimum value, but is within such limits, in which the possibility of active counteraction to the attacker remains, not allowing him to cause unacceptable damage, which allows to maintain the necessary and sufficient level of information security of the organization with limited resources. Calculated the average time spent by a SOC expert on the analysis of a suspicion of an incident, in which the quality of this analysis allows engineers to take effective actions to contain the attacker. Options for reducing this indicator are considered in view of the need to process all incoming incident suspicions in a high-quality manner in conditions of limited resources. As part of the proposed approach testing, the calculation of the optimal total time of detection, analysis and response for two types of incident suspicions is carried out.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mp7a-vpp7-xu6f</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information security</keyword>
            <keyword>retrospective search</keyword>
            <keyword>acceptable level of damage</keyword>
            <keyword>median time of an attacker’s presence in the IT infrastructure</keyword>
            <keyword>response to information security threats</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.2/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>35-47</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-5221-7621</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Elina</surname>
              <initials>Tatyana</initials>
              <email>elinatn@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-1825-0097</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Federal State Unitary Enterprise State Research Institute of Applied Problems</orgName>
              <surname>Shevchenko</surname>
              <initials>Daria</initials>
              <email>shevchenko_darya_5@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A model for implementing artificial intelligence into embedded systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper examines the problem of implementing artificial intelligence in resource-constrained embedded systems. A comprehensive analysis of existing hardware platform limitations and the challenges of integrating AI into devices with limited computing power, RAM, and energy efficiency is provided. This analysis represents a significant practical challenge in modern IoT devices, robotics, and industrial automation. The process of implementing an image classifier model trained on MNIST on a Raspberry Pi Pico microcontroller platform is described in detail. A unified methodology for implementing AI in embedded systems is proposed, covering problem definition, hardware platform selection, model selection and optimization, offline development environment setup, downloading, and testing. This methodology has practical value and can be adapted to a wide range of IoT projects.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/b3r2-vr82-1b7z</doi>
          <udk>004.7: 004.032.26</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Artificial intelligence</keyword>
            <keyword>systems modeling</keyword>
            <keyword>embedded systems</keyword>
            <keyword>image recognition</keyword>
            <keyword>Internet of Things</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.3/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>48-58</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1674-6248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>S. M. Budyonny Military Academy of the Signal Corps</orgName>
              <surname>Ostroumov</surname>
              <initials>Oleg</initials>
              <email>oleg‑26stav@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-8433-5670</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Lepeshkin</surname>
              <initials>Oleg</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method of determining the criticality of elements of a complex technical system</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The importance of information and infrastructure increases every year. The criticality of such assets is determined by the impact of disruptions to their stable operation. This paper develops an approach to determining the criticality of communication system elements. It is based on the use of a system performance profile during the construction and operation of the system. Determining the importance of each element within the communication system will ensure the stable operation of the system, aimed at fulfilling the required number of tasks and functions.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/6d8t-megz-2zb1</doi>
          <udk>621.39</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Critical information infrastructure</keyword>
            <keyword>critically important object</keyword>
            <keyword>criticality</keyword>
            <keyword>operational stability</keyword>
            <keyword>continuity of operation</keyword>
            <keyword>information security</keyword>
            <keyword>control system</keyword>
            <keyword>communication system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.4/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>59-75</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0003-6745-9414</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>LLC “Hexagon”</orgName>
              <surname>Pasechnik</surname>
              <initials>Margarita</initials>
              <email>mopasechnik@hex.team</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-4374-1645</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)</orgName>
              <surname>Finoshin</surname>
              <initials>Mikhail</initials>
              <email>MAFinoshin@mephi.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>LLC Hexagon</orgName>
              <surname>Zuikov</surname>
              <initials>Alexander</initials>
              <email>az@hex.team</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <scopusid>55229487100</scopusid>
              <orcid>0000-0002-4429-8799</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)</orgName>
              <surname>Zhukov</surname>
              <initials>Igor</initials>
              <email>i.zhukov@inbox.ru</email>
              <address>Russia, 115409, Moscow, Kashirskoe shosse, 31</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Authentication of electronic vehicle control units based on hidden channels</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">To enhance the security of industrial CAN networks in vehicles by transmitting covert information for the authentication of electronic control units. The research methods include a comparative analysis of existing approaches to constructing covert channels in vehicle CAN networks, as well as extended protocols used in CAN buses, to identify the most effective solutions for electronic control unit authentication. During the study, a covert channel scheme in the CAN FD network will be developed, and a test bench will be created to simulate its operation, taking into account various noise-based attacks. Additionally, the study will investigate the noise resistance of the proposed scheme and evaluate its applicability in real-world operating conditions. The results of the study demonstrate the successful development of a modified covert channel in the industrial CAN FD network of vehicles, resistant to noise. Based on a comparative analysis of existing protection and authentication methods in CAN networks, an optimal approach was selected, enabling the construction of a counter synchronization scheme for authentication, based on traffic optimization. The developed covert channel was integrated into a time synchronization system and tested on a bench, verifying its functionality under noise conditions. The testing results confirmed the high noise resistance of the proposed covert channel scheme, proving its effectiveness for use in automotive networks. Additionally, an analysis of the scheme’s applicability in real-world operating conditions was conducted, opening prospects for its implementation in actual vehicles using the CAN FD protocol. The scientific novelty of the work lies in the development and modification of a covert channel for authentication in the industrial CAN FD network of vehicles, resistant to noise. For the first time, a counter synchronization method for authentication based on traffic optimization is proposed, enhancing the security and reliability of the network. The study also includes a comparative analysis of the proposed scheme’s resistance to noise.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rtzv-kfdx-ddfg</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Covert channels</keyword>
            <keyword>authentication</keyword>
            <keyword>industrial CAN network</keyword>
            <keyword>CAN FD protocol</keyword>
            <keyword>noise resistance</keyword>
            <keyword>counter synchronization</keyword>
            <keyword>vehicle network security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.5/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>76-88</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0001-6593-6446</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gadisova</surname>
              <initials>Vladislava</initials>
              <email>gadisova_va@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Security issues in federated learning systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper discusses key security problems in federated learning systems: protecting the privacy of participants’ data from gradient inversion attacks and ensuring model resistance in the presence of poisoning attacks. A review of current approaches to defense against the above threats is presented, and limitations in attempting to apply them together are identified. Based on the analysis, we formulate our own ideas for further research aimed at developing more effective and balanced defense methods that consider both data privacy and poisoning attack resistance.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rp53-1tp9-n87g</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Distributed systems</keyword>
            <keyword>machine learning security</keyword>
            <keyword>federated learning</keyword>
            <keyword>gradient inversion attacks</keyword>
            <keyword>poisoning attacks</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.6/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>89-101</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6674-4374</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Crypto-Pro LLC</orgName>
              <surname>Mesengiser</surname>
              <initials>Yakob</initials>
              <email>myy@cryptopro.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000–0002–1279–0359</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Crypto-Pro LLC</orgName>
              <surname>Alekseev</surname>
              <initials>Evgeny</initials>
              <email>alekseev@cryptopro.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-4000-1174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)</orgName>
              <surname>Kyazhin</surname>
              <initials>Sergey</initials>
              <email>snkyazhin@mephi.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0001-8586-5959</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Crypto-Pro LLC</orgName>
              <surname>Smyshlyaev</surname>
              <initials>Stanislav</initials>
              <email>svs@cryptopro.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">On the practicality of attacks on electronic document management systems when signature keys are jointly used in TLS 1.2</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Prohibiting the use of identical keys in different cryptographic algorithms and protocols is a prerequisite for the security of a wide variety of information systems. However, developers of such systems sometimes ignore this requirement since underestimate the threat. This paper addresses practical attack scenarios against electronic document management systems in a situation where the signature key is also used for client authentication in the TLS 1.2 protocol. As a result of one of the attacks, an adversary forms a signature for a selected PDF file up to 16 MB in size, which is correctly displayed by a number of popular applications. An analysis of the reasons for the feasibility of these attacks leads to the conclusion that a property exists in the TLS 1.2 protocol that leads to a vulnerability when the client authentication key is used as a signature key in electronic document management systems.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/8rnd-8vte-brfu</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Cryptography</keyword>
            <keyword>digital signature</keyword>
            <keyword>TLS</keyword>
            <keyword>authentication</keyword>
            <keyword>joint using of a single key</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.7/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>102-109</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Abramova</surname>
              <initials>Alexandra</initials>
              <email>alexandria567@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-5069-6144</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Prostakevich</surname>
              <initials>Konstantin</initials>
              <email>atombyfreund@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0003-0554-5790</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Abramov</surname>
              <initials>Valery</initials>
              <email>val.abramov@mail.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <orcid>0000-0002-4822-6768</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Levina</surname>
              <initials>Anastasia</initials>
              <email>alyovina@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Systemic automation of geoinformation support for autonomous navigation safety in Arctic under climate change</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">There are presented the research results on the systemic automation of geoinformation support for security of autonomous navigation in the Arctic, under climate change. In the course of the research, there were used the methodological foundations of risk management technologies while developing natural – industrial systems. A structural model is proposed that combines investment goals with the costs of geoinformation security support in projects for the development of autonomous navigation in the Arctic. Based on the proposed model, a modular web-based tool has been given that implements systemic automation of geoinformation security for autonomous navigation in the Arctic under climate change. Examples of using the developed tool are given.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/zg23-43gm-frvr</doi>
          <udk>007.51</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Automation</keyword>
            <keyword>geoinformatics</keyword>
            <keyword>autonomous navigation</keyword>
            <keyword>safety</keyword>
            <keyword>Arctic</keyword>
            <keyword>climate change</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.8/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>110-120</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0003-2984-3685</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Ogarev Mordovia State University</orgName>
              <surname>Gulkin</surname>
              <initials>Kamil</initials>
              <email>kamil.g.04@bk.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9493-1273</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research Ogarev Mordovia State University</orgName>
              <surname>Bakaeva</surname>
              <initials>Olga</initials>
              <email>helga_rm@rambler.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Software for detecting potentially dangerous items at mass event entries using computer vision</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The work is devoted to the development of software for automated detection of potentially dangerous objects in the form of large bags/backpacks on video streams at the entrance of participants to mass events. A client-server solution architecture is proposed, which includes a Streamlit interface, an Ultralytics YOLOv11 detection module, and an incident registration and alerting subsystem. The accuracy of bag identification is verified using the formalized “coordinated detection” criterion: an event is recorded when the confidence threshold γ is exceeded on at least α frames in a sliding window of length τ. On four RTSP channels (processing every 3rd frame), latency of ≈0.5 s was achieved, and false positives were mitigated through time aggregation. The YOLOv11 neural network was trained on a dataset containing 36,000 images, resulting in stable performance (P ≈ 0.953 for “dangerous” object detection accuracy and R ≈ 0.896 for completeness/sensitivity).</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/e8rx-vv5u-kukg</doi>
          <udk>004.932.72; 004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Software</keyword>
            <keyword>computer vision</keyword>
            <keyword>neural network YOLOv11</keyword>
            <keyword>object detection</keyword>
            <keyword>video monitoring</keyword>
            <keyword>“consistent detection”</keyword>
            <keyword>information security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.9/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>121-137</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0003-2993-0287</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Samara State Technical University</orgName>
              <surname>Ahmed</surname>
              <initials>Tamer Rashid</initials>
              <email>thameer987@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-5778-3438</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Samara State Medical University</orgName>
              <surname>Avsievich</surname>
              <initials>Aleksandr</initials>
              <email>avsievich@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Deep learning models for effective detection of fake news</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This work is devoted to the development of algorithms aimed at improving the detection of false and malicious information disseminated under the guise of news reports. Special attention is paid to their impact on the reliability of information in the modern digital world. To classify and identify fake news, deep learning algorithms have been proposed, including bidirectional recurrent neural networks (BiLSTM), recurrent neural networks (LSTM) and convolutional neural networks followed by bidirectional recurrent networks (CNN + BiLSTM). The effectiveness of the developed models was evaluated on a specialized dataset containing the texts of real and fake news articles in English, taking into account the news agenda in the Islamic context. The results showed that the BiLSTM model achieved a slightly higher accuracy of 98.0 % compared to other models, which proves the effectiveness of deep learning algorithms in detecting fake news. The study offers a promising approach to solving this problem and highlights the importance of developing better tools to ensure the accuracy of information and protect users from misinformation. In the conducted studies, by improving the neural network configuration, it became possible to increase the accuracy of the LSTM, BiLSTM, CNN + BiLSTM models by 7.65, 2.5 and 1.9 %, respectively, compared with previous results.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mh68-utm7-dxb1</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Fake news</keyword>
            <keyword>false information</keyword>
            <keyword>natural language processing</keyword>
            <keyword>deep learning</keyword>
            <keyword>BiLSTM</keyword>
            <keyword>LSTM</keyword>
            <keyword>CNN + BiLSTM</keyword>
            <keyword>CNN</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.10/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>138-162</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Konovalchik</surname>
              <initials>Pavel</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>JSC Russian Space Systems</orgName>
              <surname>Ovcharov</surname>
              <initials>Vladimir</initials>
              <email>eo475944@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Methodological and technological foundations for countering cognitive threats in generative multimodal content</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The rapid development of artificial intelligence platforms, methods, and technologies creates favorable conditions for the formation of destructive multimodal content and its controlled distribution across various information resources on the Internet. The article presents original research results and develops an approach to countering a new class of information threats – cognitive threats in generative multimodal content. For the first time, a cognitive threat model has been substantiated that takes into account the specifics of a new class of attackers – cognitive security violators. New scientific results have been obtained through training and applying scientifically validated classes of neural network models to analyze various types of emotions. Their novelty and practical value are related to the applicability of these models to solving problems of detecting various types of cognitive biases in the generative multimodal content of Telegram channels.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/6b6u-6nv2-9nar</doi>
          <udk>004.8 + 004.9 + 162.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information threats</keyword>
            <keyword>artificial intelligence</keyword>
            <keyword>cognitive biases</keyword>
            <keyword>cognitive security</keyword>
            <keyword>cognitive threats</keyword>
            <keyword>generative multimodal content</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.11/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>163-183</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7231-5728</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Spirin</surname>
              <initials>Andrey </initials>
              <email>spirin_aa@mirea.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0006-2542-1348</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Lebin</surname>
              <initials>Maksim</initials>
              <email>lebin2002@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0006-1697-2631</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Gindin</surname>
              <initials>Evgeny</initials>
              <email>jenyag2002@gmail.com</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0009-0001-2060-785X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Isakova</surname>
              <initials>Natalia</initials>
              <email>ntfenech@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">The impact of adversarial attacks on deep learning models</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This study presents a comparative analysis of the robustness of modern deep learning architectures against adversarial attacks. The study focuses on three representative models – EfficientNet-B0, MobileNetV2, and Vision Transformer (ViT-B16) – illustrating the evolution of architectures from convolutional networks to transformer-based approaches. The experimental evaluation was conducted on the ISIC‑2019 medical dataset containing dermoscopic images of skin lesions. To assess model robustness, a comprehensive set of digital and physical attacks was employed, including DeepFool, Carlini – Wagner, AutoAttack, Boundary Attack, and Patch Attack. The analysis demonstrated that all evaluated models exhibit significant vulnerability to targeted perturbations: optimizationbased attacks reduce classification accuracy by more than 55 percentage points, while physical attacks can disrupt model predictions even without access to internal parameters. The Vision Transformer (ViT-B16) showed relative resilience to minor perturbations, indicating the potential of attention-based architectures for improving robustness, though complete protection remains unattainable. The results emphasize the necessity of developing integrated approaches to adversarial robustness, encompassing architectural modifications, regularization techniques, and adaptive training – a direction of particular importance for critical domains such as medicine, transportation, and security systems.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/2e7p-gxfk-11a3</doi>
          <udk>004.056.5, 004.85:004.89, 519.237.8</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Adversarial attacks</keyword>
            <keyword>neural network robustness</keyword>
            <keyword>deep learning</keyword>
            <keyword>EfficientNet</keyword>
            <keyword>MobileNet</keyword>
            <keyword>Vision Transformer</keyword>
            <keyword>computer vision</keyword>
            <keyword>model protection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2025.24.12/</furl>
          <file>pib_4.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
