<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>1</number>
    <altNumber> </altNumber>
    <dateUni>2022</dateUni>
    <pages>1-133</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>11-17</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1736-7178</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anisimov</surname>
              <initials>Vladimir</initials>
              <email>an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-6527-2352</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peoples’ Friendship University of Russia named after Patrice Lumumba</orgName>
              <surname>Anisimov</surname>
              <initials>Evgeny</initials>
              <email>anis.an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Saurenko</surname>
              <initials>Tatyana</initials>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>LOS </surname>
              <initials>Vladimir</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS   OF COMPUTER NETWORKS FROM VIRAL ATTACKS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Computer networks are an important part of modern civilization. They are used literally in all spheres of human activity. Significant losses due to failures of these networks cause high require ments for the stability of their operation. Ensuring the necessary resilience, in particular, relies on the protection of computer networks from virus attacks. In its interests, appropriate protection sys tems are being created. As an indicator of the effectiveness of such systems, it is proposed to use the number of network computers that a virus manages to infect before it is detected and removed. The empirical basis for assessing the effectiveness of systems for protecting computer networks from virus attacks is the data obtained as a result of field tests and (or) previous operating experience. These data are random in nature, and their volume, as a rule, is significantly limited. An approach to assessing the effectiveness of systems for protecting computer networks from virus attacks, taking into account the indicated features of empirical data, is considered in this article. The approach is based on the presentation of empirical data in the form of a small sample from the general pop ulation of values of a random variable of the number of computers on the network that the virus managed to infect before it was detected and removed. The distribution function of this quantity is taken as a test model. The construction of the distribution function is based on the principle of maximum uncertainty. Shannon’s entropy is taken as a measure of uncertainty.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/z4at-58k4-tbp6</doi>
          <udk>004.056.57</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>computer network</keyword>
            <keyword>virus attack</keyword>
            <keyword>network protection system</keyword>
            <keyword>protection efficiency</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.1/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>18-31</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Poltavtsev</surname>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE   AND PROACTIVE METHODS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">If the data is not available to the outside world, it is useless. The data must be available so that the necessary processing and planning can be carried out. Regulating and monitoring user access to a database is one of the important tasks of the database security community. Database pro tection against inference attacks is a part of information security that tries to prevent the disclosure of sensitive information through available information (tables, individual records). It is necessary to have methods capable of maintaining a balance between the use of information and the protection of data. The purpose of this work is to compare different inference control methods in order to evaluate the methods results to minimize both the loss of information and the risk of information disclosure.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pmmp-3uhf-npad</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information Security</keyword>
            <keyword>Security Monitoring</keyword>
            <keyword>Security Control</keyword>
            <keyword>Data Structuring</keyword>
            <keyword>Data Engineering</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.2/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>32-40</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kriulin</surname>
              <initials>Artur</initials>
              <email>kriulin@mirea.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-5511-4000</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Eremeev</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>POTERPEEV</surname>
              <initials>German</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG"/>
        </artTitles>
        <abstracts>
          <abstract lang="ENG"/>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/3d3r-etdx-nfu9</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>computer security</keyword>
            <keyword>Mitre</keyword>
            <keyword>APT</keyword>
            <keyword>malware</keyword>
            <keyword>executable file</keyword>
            <keyword>statistical analysis.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.3/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>41-50</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Fatin</surname>
              <initials>Aleksander</initials>
              <email>sasha-fatin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper discusses the main methods of immunization of modern computer networks. The greatest attention is paid to topologies and types of graph structures under consideration. An assessment and comparison of existing immunization strategies and methods for solving the prob lems of optimal selection of nodes for immunization in the context of the considered topologies is also carried out. The main advantages, disadvantages and areas of application of the selected topologies and methods for solving immunization problems are highlighted.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mp53-t3hn-1pt3</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>computer networks</keyword>
            <keyword>immunization</keyword>
            <keyword>cyber-physical systems</keyword>
            <keyword>network security</keyword>
            <keyword>scale-free networks.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.4/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>51-57</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6419-0072</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Tatarnikova</surname>
              <initials>Tatiana</initials>
              <email>Tm-tatarn@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid> 0000-0002-2447-2737</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname> SVERLIKOV </surname>
              <initials>Alexander</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC   OF THE INTERNET OF THINGS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">It is shown that data protection technologies used in wired communication networks are not available for low-power devices of the Internet of things. Therefore, the search for an attack on IoT devices can be implemented by means of analyzing the traffic that carries the attack and, as a result, is classified as anomalous. A technique for searching for an anomaly in the network traffic of the Internet of things is proposed. A sequence of steps is considered to isolate a random compo nent from the traffic generated by the IoT sensor devices, remaining after the exclusion of the main characteristics and which may contain an anomaly. The software implementation of the proposed technique can become part of the intrusion detection system for the Internet of things.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/vxp5-pvhu-m4a2</doi>
          <udk>№ 004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Internet of things</keyword>
            <keyword>anomalous traffic</keyword>
            <keyword>data security</keyword>
            <keyword>traffic analysis technique</keyword>
            <keyword>intrusion detection system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.5/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>58-67</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-5895-5385</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>STARIKOV</surname>
              <initials>Timofey</initials>
              <email>tvs_7@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0546-7801</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>SOPIN</surname>
              <initials>Kirill</initials>
              <email>sopin.kirill2010@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-0644-4353</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Dichenko</surname>
              <initials>Sergei</initials>
              <email>dichenko.sa@yandex.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0001-9665-2174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Samoilenko</surname>
              <initials>Dmitry</initials>
              <email>19sam@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING   TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The actual problem of optimization of information integrity control in data storage sys tems functioning in conditions of continuous growth of its volumes and destructive influences of an attacker is considered. A method of cryptographic integrity control of multidimensional data arrays based on the rules for constructing Reed-Solomon codes is presented.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/b94e-kfnm-8atd</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information protection</keyword>
            <keyword>data integrity control</keyword>
            <keyword>cryptographic methods</keyword>
            <keyword>Reed-Solomon code</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.6/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>68-76</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7348-9287</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Dostoevsky Omsk State University</orgName>
              <surname>Vilkhovsky</surname>
              <initials>Danil</initials>
              <email>vilkhovskiy@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">METHOD OF DETECTING LSB INSERTS IN LOW STEGO-PAYLOAD COLOR  PHOTOGRAPHIC IMAGES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper presents a compact method of detecting LSB inserts in color photographic im ages that proves high efficiency when dealing with low stego-payload images. The method is based on an analysis of signatures of pairwise similarity the zero and first layers, an algorithm for largest empty rectangles, white (black) pixel dominance pattern and image moments analysis.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/f7z9-ttke-gv81</doi>
          <udk>004.932.2</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Steganalysis</keyword>
            <keyword>steganographic analysis</keyword>
            <keyword>stegocontainer analysis</keyword>
            <keyword>LSB-insert detection.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.7/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>77-84</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>SOKOLOV</surname>
              <initials>Alexander</initials>
              <email>sokolov2.as@edu.spbstu.ru </email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>CHERNOV</surname>
              <initials>Andrey</initials>
              <email>chernov@ibks.spbstu.ru </email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Konoplev</surname>
              <initials>Artem</initials>
              <email>konoplev_as@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">SPECULATIVE EXECUTION ATTACK-RESISTANT CRYPTOSERVICES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG"> The appearance of Meltdown/Spectre attacks exploiting the vulnerabilities in Intel pro cessors via misuse of speculative executions has destroyed confidence in the security of user’s con f idential data which includes cryptoservices secret parameters. The developed Meltdown/Spectre countermeasures demonstrated ineffectiveness in neutralizing the newly designed speculative execution attacks. Paper highlights a fundamental solution of specified issue via Intel ME technolo gy usage. The dedicated Intel ME processor is immune to Meltdown/Spectre attacks, which makes it effective to be used as a cryptoprocessor. Implementation of the proposed approach can be achieved through the usage of Intel Dynamic Application Loader (Intel DAL) technology.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/bt14-g255-73ma</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>side-channel attacks</keyword>
            <keyword>speculative execution</keyword>
            <keyword>Meltdown</keyword>
            <keyword>Spectre</keyword>
            <keyword>Intel ME</keyword>
            <keyword>Intel DAL</keyword>
            <keyword>cryptoservice</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.8/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>85-95</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-0546-7801</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>SOPIN</surname>
              <initials>Kirill</initials>
              <email>sopin.kirill2010@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0644-4353</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Dichenko</surname>
              <initials>Sergei</initials>
              <email>dichenko.sa@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9665-2174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Samoilenko</surname>
              <initials>Dmitry</initials>
              <email>19sam@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">CRYPTOGRAPHIC DATA INTEGRITY CONTROL BASED   ON GEOMETRIC FRACTALS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG"> New complex tasks related to information security when scaling data storage systems are considered. A method of cryptographic integrity control of large data arrays based on geometric fractals is presented.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ktu1-1632-n54t</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>data storage system</keyword>
            <keyword>information protection</keyword>
            <keyword>data integrity control</keyword>
            <keyword>hash function</keyword>
            <keyword>Sierpinski triangle.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.9/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>96-109</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6370-123X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>DANILOV</surname>
              <initials>Vladislav</initials>
              <email>danilov.wrk@gmail.com </email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-8206-2915</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Denis </initials>
              <email>ivanov@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Konoplev</surname>
              <initials>Artem</initials>
              <email>konoplev_as@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">SYNTHETIC DATA GENERATION FOR HONEYPOT SYSTEMS   USING DEEP LEARNING METHODS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article presents research aimed at analyzing methods for generating synthetic data to populate honeypot systems. To select the generated data types, the relevant target objects in the context of honeypot-systems are identified. Existing generation methods are investigated. Methods for evaluating the quality of generated data in the context of honeypot systems are also analyzed. As a result, a layout of an automated system for generating synthetic data for honeypot-systems is developed and its performance is evaluated.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5xdh-23hk-dmhm</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>honeypot system</keyword>
            <keyword>deep learning methods</keyword>
            <keyword>synthetic data generation</keyword>
            <keyword>machine learning</keyword>
            <keyword>inference attacks.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.10/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>110-120</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-2233-811X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Sukhov</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1404-6125</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Krupenin</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-6071-8087</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Yakunin</surname>
              <initials>Vladimir</initials>
              <email>Yavi1957@mil.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG"> METODS OF CONSTRUCTING MATHEMATICAL MODELS OF QUALITY  INDICATORS OF THE RESULTS OF THE PROCESS OF FUNCTIONING  OF THE INFORMATION SECURITY SYSTEM</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A new approach is considered related to the construction of mathematical models of quality indicators for further evaluation of the process of functioning of the information security system, taking into account the requirements for the results of the operation. The vector of quality indicators of the results of the process of functioning of the system. Under consideration is sub stantiated, models of the virtual indicator and the required quality of the results of the process of functioning of the information security system are presented.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/xvx1-7ppr-2prx</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>mathematical model</keyword>
            <keyword>quality indicator</keyword>
            <keyword>destructive impact scenario</keyword>
            <keyword>unified information space</keyword>
            <keyword>information security system.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.11/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>121-131</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6695-2328</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State Marine Technical University</orgName>
              <surname>Garkushev</surname>
              <initials>Alexander</initials>
              <email>sangark@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>SYSUEV</surname>
              <initials>Sergey</initials>
              <email>sysuev1971@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">PROCEDURE FOR INTEGRATION OF INFORMATION PROTECTION MODULES  INTO DOMESTIC AUTOMATED DESIGN SYSTEMS IN SHIPBUILDING</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to the development of a model and algorithm for solving the problem of ensuring information security in promising domestic computer-aided design systems based on a modified method of branches and boundaries using the duality of solutions to linear programming problems. As a result, an algorithm was obtained that allows the developer to ensure the informa tion security of shipbuilding projects at a sufficient level.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5tuk-48fz-zmx5</doi>
          <udk>65.011.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>ship design</keyword>
            <keyword>mathematical model.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.6.12/</furl>
          <file>2022_1_rus.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
