<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>4</number>
    <altNumber> </altNumber>
    <dateUni>2021</dateUni>
    <pages>1-158</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-25</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kiselev</surname>
              <initials>Alexey</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0004-1271-709X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ognev</surname>
              <initials>Roman </initials>
              <email>ognev_ra@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0009-0002-7321-7430</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zhukovskii </surname>
              <initials>Evgeniy </initials>
              <email>bugaev.va@edu.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Identification of malicious executable files based on static-dynamic analysis using machine learning</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to the study of methods for detecting malicious software (malware) using static-dynamic analysis. A method for detecting malware is proposed, in which the number of parameters of the behavior of executable files is optimized using clustering of insignificant features, and also fuzzy-hashing of own functions is used when constructing a call trace. A prototype of a malware detection system based on the proposed method has been developed. Experimental studies assess the effectiveness of the proposed method. The efficiency of malware detection by the developed prototype is estimated. According to the verification results, the developed prototype was able to improve the detection efficiency of malware.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/422m-udhg-dg48</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security systems</keyword>
            <keyword>detection of malicious software</keyword>
            <keyword>static-dynamic analysis</keyword>
            <keyword>parameter feature selection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.1/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>26-38</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zubkov</surname>
              <initials>Evgeny</initials>
              <email>zubkov.e@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-7321-7430</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zhukovskii </surname>
              <initials>Evgeniy </initials>
              <email>bugaev.va@edu.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Research of information security problems of heterogeneous corporate computer networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The structure, the functioning principle and the main characteristics of a corporate computer network were investigated. There was analysis of the information security threats which can be used to this type of network, taking into the client-server model of data transmission over communication channels. Finally, there was a comparative analysis of information security audit methods, as well as means of implementing the audit process.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/r5a9-vpe1–69db</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>audit</keyword>
            <keyword>information security</keyword>
            <keyword>information technologies</keyword>
            <keyword>corporate computer network</keyword>
            <keyword>Brutespray</keyword>
            <keyword>Metasploit</keyword>
            <keyword>Nmap</keyword>
            <keyword>OpenVAS</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.2/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>39-50</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Strukova</surname>
              <initials>Natalia</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Predicting network attacks on IoT systems using regression analysis</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The aim of the study is to improve the accuracy of IoT network attack detection by applying feature selection methods based on regression models. An analysis of the security problems of IoT systems is presented. The architecture of an intrusion detection system using the considered methods is developed. A software layout that implements the proposed architecture is developed and its effectiveness is evaluated</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/8dr8–1gna-v9bx</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Internet of Things</keyword>
            <keyword>intrusion detection system</keyword>
            <keyword>network attack detection</keyword>
            <keyword>prediction</keyword>
            <keyword>significance assessment</keyword>
            <keyword>feature selection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.3/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>51-60</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0815-3688</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Karachanskaya</surname>
              <initials>Elena</initials>
              <email>elena_chal@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-5796-8504</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Romanov</surname>
              <initials>Alexey</initials>
              <email>aron1397@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Development of a data hashing method based on cellular automation and its advantages</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The purpose of this article is to present a method for depersonalizing personal data based on the use of cellular automata. This method is the construction of a hash function with a secret key that performs transformations on a two-dimensional matrix in accordance with the transition rules for two-dimensional cellular automata. A new kind of transition rules for two-dimensional cellular automata related to the Moore neighborhood and the state of the cell is proposed. Additionally, these rules are based on the initial state of the matrix, which avoids the existence of insignificant bits that can lead to collisions. The proposed hashing method can be classified as universal. A computer program “HFCA-2D” is presented, designed not only to automate the process of hashing data using cellular automata, but also containing tools for testing hashing algorithms for speed and the presence of collisions when processing various types and amounts of data, in comparison with SHA algorithms. 256 and SHA-512. The test results showed that the developed data hashing method provides a high level of security and privacy protection</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/b8rm-kxbd‑3u67</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>hashing method</keyword>
            <keyword>hash function</keyword>
            <keyword>cellular automaton</keyword>
            <keyword>pseudonymisation and anonymization of data</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.4/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>61-71</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-1399-1822</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Shenets </surname>
              <initials>Nikolay</initials>
              <email>shenets_nn@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Authentication and key establishment in WSN based on key pre-distribution</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">In this work a new authentication and key establishment method in WSN is presented. It is based on the modification of Blundo et. al. key distribution protocol</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5m4v‑94zg-hr83</doi>
          <udk>004.056.53 (003.26)</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>authentication and key establishment protocol</keyword>
            <keyword>Wireless Sensor Network</keyword>
            <keyword>key pre-distribution</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.5/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>72-78</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2393-9603</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Samara State Technical University</orgName>
              <surname>SHAKURSKIY</surname>
              <initials>Maxim</initials>
              <email>vigorsilentium@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Two-component real-time steganographic system of information embedding in the least significant bits of audio signal</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper discusses steganographic system of embedding two-component container in audio signal in real time. Steganographic system based on two-component container using samples of cover audio object as a source of first steganographic component. This allows obtaining new properties of a steganographic system</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/g1v4-up35–1trg</doi>
          <udk>621.372.552</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>two-component steganographic system</keyword>
            <keyword>invariance to masking signal</keyword>
            <keyword>steganographic container</keyword>
            <keyword>key coefficient</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.6/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>79-90</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Glukharev</surname>
              <initials>Mikhail</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kryukov</surname>
              <initials>Alexander</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-4866-217X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Gryzunov</surname>
              <initials>Vitaly</initials>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <scopusid>7006566675</scopusid>
              <orcid>0000-0002-6076-7241</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Emperor Alexander I St. Petersburg State Transport University</orgName>
              <surname>Kornienko</surname>
              <initials>Anatoliy</initials>
              <email>kaa.pgups@yandex.ru</email>
              <address>Russia, 190031, St. Petersburg, Moskovsky ave., 9</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Selection of trust models when integrating distributed information systems of critical application</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Distributed information systems of critical application are integrated with each other, which means that it is necessary to manage the distribution of trust. The article analyzes the features of trust models based on the use of electronic signatures for their applicability in information systems of critical application. The necessary conditions for the existence of a public key infrastructure are formulated and proven. Examples of threats to necessary conditions are given, trust models are selected that are suitable for the integration of information systems of critical application</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ev3e-fmtu-x25h</doi>
          <udk>004.27+004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information systems of critical application</keyword>
            <keyword>information security</keyword>
            <keyword>public key infrastructure</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.7/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>91-100</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Vasileva</surname>
              <initials>Ksenia</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Development of a mechanism to control message integrity on the local network of vehicles</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The work focuses on creating a message integrity control method with the ability to authenticate the source of control flow data in a local vehicular network. The implementation of the integrity control mechanism is based on a role-based security model that governs the allocation of subject rights to use authentication modules, and a data authentication scheme that prevents replay and impersonation attacks</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/xk5n-pzeb-xrr8</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>vehicles</keyword>
            <keyword>integrity control</keyword>
            <keyword>role model</keyword>
            <keyword>transport technology cyber security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.8/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>101-111</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Artificial immunization in cybersecurity duties</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article proposes an immune-like approach to information security of modern complex systems. This approach is based on the use of immune-like methods to protect critical system nodes from a predetermined set of attacks, and to minimize the success of an attack on the system. The methodological approach is to systematize immunization tasks, tools, and modes to describe how modern systems can resist the proliferation of computer attacks. The main conclusions and recommendations are that using the immunization approach will not only improve the security of systems, but also define principles for building systems that are resistant to cyber attacks</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/k229-ud9f‑34k5</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cybersecurity</keyword>
            <keyword>immunisation</keyword>
            <keyword>targeted immunisation</keyword>
            <keyword>cyberthreat</keyword>
            <keyword>honeypot</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.9/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>112-122</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0374-4649</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Sergadeeva </surname>
              <initials>Anastasia</initials>
              <email>nsspbpoly@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Banking fraud detection using graph neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper proposes the application of graph neural networks to detect bank fraud. Financial transactions are represented in the form of a graph, and the use of graph neural networks allows the detection of transactions characteristic of fraudulent schemes. Experimental results demonstrate the promise of the proposed approach</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/reag-mhhb-n41d</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>graph neural networks</keyword>
            <keyword>bank fraud</keyword>
            <keyword>anomaly detection</keyword>
            <keyword>convolutional neural networks</keyword>
            <keyword>information security</keyword>
            <keyword>financial data analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.10/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>123-136</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6581-3473</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Rostova</surname>
              <initials>Olga</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-5555-8114</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Shmeleva</surname>
              <initials>Anastasia</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-6873-3006</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Suloeva</surname>
              <initials>Svetlana</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Use of agile management tools in projects of information security systems implementation</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article discusses the features of project management for the implementation of information security systems, as well as the feasibility of using agile management tools in such projects, in particular, the cyclic implementation model. The requirements for the implemented information security system are developed and justified, specifically: requirements for the organization of the network infrastructure, requirements for the configuration of information infrastructure components, requirements for the documentation being developed, technological and technical-economic requirements. The process of information security system implementation management is described: processes of content, terms, risks and human resources management of the project</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5zkx‑22b9–8kam</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>project management</keyword>
            <keyword>information security systems</keyword>
            <keyword>agile management tools</keyword>
            <keyword>cyclic implementation model</keyword>
            <keyword>risk management</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.11/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>137-143</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Zabezhailo</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-6493-3622</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Timonina</surname>
              <initials>Elena</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Lomonosov Moscow State University</orgName>
              <surname>Grusho</surname>
              <initials>Alexander</initials>
              <email>grusho@yandex.ru</email>
              <address>Russia, 119991, Moscow, Leninskie Gory, 1</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-5005-2744</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Grusho</surname>
              <initials>Nikolaj</initials>
              <email>info@itake.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">The problems of trust assessment in Big Data analysis</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper examines the problem of evaluation of trust to the results of complex computer analysis of data. The approach of constructing empirical dependencies based on similarity of precedents in the training sample, which has already become classical, is used. The trust approximation is based on simulating training data by random sampling from an unknown distribution. This approach implements approximate causal analysis and have advantages and disadvantages</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/r6zg‑4umu-nv12</doi>
          <udk>004.896</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>artificial intelligence</keyword>
            <keyword>causal relationships</keyword>
            <keyword>contradictions in data</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.12/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>144-156</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-3710-1652</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Torgov</surname>
              <initials>Vladislav</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Distributed ledger technologies application to audit and investigate incidents in big data processing systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper considers the problem of providing auditing of granular transformations in heterogeneous Big Data processing systems. The use of distributed ledger technologies for tracking data fragment transformations is proposed. The authors make a comparison of technologies applicable to solve this problem, provide an analytical and experimental evaluation, recommendations for the application of the study results. In contrast to other similar works, the authors consider the application of various distributed ledger technologies and include the multiplatform requirement for the framework. The proposed framework is universal and can be used in heterogeneous multiplatform big data processing systems</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/r3x6-ea4a-aaxn</doi>
          <udk>004.896</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>Big Data</keyword>
            <keyword>audit</keyword>
            <keyword>incident investigation</keyword>
            <keyword>Blockchain</keyword>
            <keyword>distributed ledger</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.5.13/</furl>
          <file>2021_4-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
