<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>2</number>
    <altNumber> </altNumber>
    <dateUni>2022</dateUni>
    <pages>1-160</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-19</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Konoplev</surname>
              <initials>Artem</initials>
              <email>konoplev_as@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>SOKOLOV</surname>
              <initials>Alexander</initials>
              <email>sokolov2.as@edu.spbstu.ru </email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>CHERNOV</surname>
              <initials>Andrey</initials>
              <email>chernov@ibks.spbstu.ru </email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">MITIGATION OF SPECULATIVE EXECUTION ATTACKS   BY INTEL DAL TECHNOLOGY APPLICATION</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG"> The complexity of neutralization and the lack of a universal mitigation approach of spec ulative execution attacks allows potential malware to have an unauthorized access to data being processed by CPU. To provide the confidentiality of such data it`s processing should be transferred from CPU to a microprocessor operating in a trusted execution environment. Paper describes the approach of using Intel DAL technology, which allows to implement application in Intel ME subsys tem, thus completely mitigate side channel speculative execution attacks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/dmp6-57v4-utpe</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>side-channel attacks</keyword>
            <keyword>speculative execution</keyword>
            <keyword>Meltdown</keyword>
            <keyword>Spectre</keyword>
            <keyword>Intel TEE</keyword>
            <keyword>Intel ME</keyword>
            <keyword>Intel DAL</keyword>
            <keyword>cryptoservices.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.1/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>20-29</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-0644-4353</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Dichenko</surname>
              <initials>Sergei</initials>
              <email>dichenko.sa@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9665-2174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Samoilenko</surname>
              <initials>Dmitry</initials>
              <email>19sam@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-0546-7801</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>SOPIN</surname>
              <initials>Kirill</initials>
              <email>sopin.kirill2010@yandex.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-7578-997X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>POVCHUN</surname>
              <initials>Ivan</initials>
              <email>Powchun2014@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">ENSURING DATA INTEGRITY BASED   ON NUMBER-THEORETICAL GAUSS TRANSFORMATIONS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The problem of information security in modern conditions of application and function ing of information systems, complicated by the continuous growth of the volume and value of processed information, is considered in the article. A method for ensuring data integrity based on numerical-theoretic Gauss transformations is presented.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/5zh4-tu6r-fgk8</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information system</keyword>
            <keyword>information protection</keyword>
            <keyword>control and restoration of data integrity</keyword>
            <keyword>complex numbers.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.2/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>30-34</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-5785-5160</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Omsk State Technical University</orgName>
              <surname>Belim</surname>
              <initials>Sergey</initials>
              <email>sbelim@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-7839-2345</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>MUNKO</surname>
              <initials>Sergey</initials>
              <email>munko_s@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">ALGORITHM FOR EMBEDDING DIGITAL WATERMARK IN DYNAMIC MEMORY OF EXECUTABLE CODE</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article proposes an algorithm for embedding a digital watermark into the executable&#13;
code of the program. Dynamic memory of the program is used as a stegocontainer. The digital&#13;
watermark is formed in the memory of the executable program under certain conditions. The embedding&#13;
parameters are determined by the executable code and the run time of the program. The&#13;
digital watermark is checked by a separate application using key information.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/n32g-48d6-udt6</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>digital watermark</keyword>
            <keyword>steganography</keyword>
            <keyword>dynamic memory</keyword>
            <keyword>authentication</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.3/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>35-50</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0733-1294</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ETU “LETI”</orgName>
              <surname>NEVEROV</surname>
              <initials>Eugeny</initials>
              <email>datnever@ya.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9616-7304</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ETU “LETI”</orgName>
              <surname>SADREEV</surname>
              <initials>Elnar</initials>
              <email>elnar.sadreev@gmail.com</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-1097-336X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>BEREZOVSKAYA</surname>
              <email>berezovskaya.ole@gmail.com</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0001-081-8797</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University, “LETI”</orgName>
              <surname>CHUPROV</surname>
              <initials>Sergey</initials>
              <email>chuprov@itmo.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">REVIEW AND COMPARISON OF AES LIGHTWEIGHT MODIFICATIONS FOR A LOW-POWER DEVICES NETWORK</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Nowadays, the development of smart city concepts and cyber-physical systems is impossible&#13;
without considering information security issues. In the conditions of limited computational&#13;
resources, it is necessary to find a trade-off between the cryptographic strength of the encryption&#13;
algorithm and its requirements. As part of the study, lightweight modifications of the AES symmetric&#13;
block cipher are compared to identify the most balanced solution for ensuring the confidentiality of&#13;
low-power devices communication. The comparison is made both in terms of theoretical indicators&#13;
that determine cryptographic strength, and in terms of encryption and decryption time, depending&#13;
on the size of the input data. The obtained results demonstrate that the Modified AES is the most&#13;
balanced solution in relation to the specified requirements. It outperforms not only other modifications,&#13;
but also the standard algorithm, improving the diffusion and confusion values by 5 % and 30 %&#13;
respectively, and also reducing the average encryption/decryption time by one and a half times</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/gp9v‑96dh‑32v1</doi>
          <udk>004.056.55</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>AES</keyword>
            <keyword>lightweight modifications</keyword>
            <keyword>resource-constrained environment</keyword>
            <keyword>cryptographic protection</keyword>
            <keyword>smart city</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.4/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>51-64</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">ADAPTIVE CONTROL SYSTEM FOR DETECTING COMPUTER ATTACKS ON OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents an adaptive control system for detecting computer attacks in critical&#13;
information infrastructure based on a neuro-fuzzy analysis of variant cyber-threat spaces and parameters&#13;
of the protected object using the automatically reconfigurable ANFIS neuro-fuzzy inference&#13;
system and Takagi-Sugeno-Kanga fuzzy basis. The results of experimental studies have shown&#13;
that the developed system provides high accuracy and speed of detecting computer attacks in&#13;
changing decision-making conditions</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/gtpz-vrmm-b6v2</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Adaptive Control</keyword>
            <keyword>Critical Information Infrastructure</keyword>
            <keyword>Neuro-Fuzzy System</keyword>
            <keyword>Computer Attack Detection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.5/</furl>
          <file>2022_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>65-72</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Fatin</surname>
              <initials>Aleksander</initials>
              <email>sasha-fatin@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">IMMUNIZATION OF COMPLEX NETWORKS: A SYSTEM OF DIFFERENTIAL EQUATIONS AND DYNAMIC VARIATION</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper discusses new approaches to building models of immunization of modern&#13;
computer networks. The greatest attention is paid to the consideration of the P2P static model,&#13;
segment model, as well as models of dynamic representation of cyclic and growing graphs. The&#13;
main advantages and areas of application of the considered models, the nuances of their use and&#13;
the novelty of the considered methods are highlighted</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/uk4r‑9a44-44kg</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Computer Networks</keyword>
            <keyword>Immunization</keyword>
            <keyword>Scale-Free Networks</keyword>
            <keyword>P2P</keyword>
            <keyword>Segment Model</keyword>
            <keyword>Cyberphysical Systems</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.6/</furl>
          <file>2022_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>73-81</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2264-7513</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Krundyshev</surname>
              <initials>Vasiliy </initials>
              <email>krundyshev_vm@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">MATHEMATICAL MODEL OF SPREAD OF COMPUTER ATTACKS ON CRITICAL INFORMATION INFRASTRUCTURE</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents a mathematical model for the spread of computer attacks on critical&#13;
information infrastructure based on the extension of the basic Lotka-Volterra model. Within the&#13;
framework of the proposed model, the problem to be solved is formulated, the point of stability&#13;
of the system is determined, and a criterion is proposed for the adequacy of the applied methods&#13;
for detecting attacks to changing parameters of the critical information infrastructure and existing&#13;
cyber threats.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pp2h-mkd7-p6bp</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Critical Information Infrastructure</keyword>
            <keyword>Adequacy Criterion</keyword>
            <keyword>Mathematical Model</keyword>
            <keyword>Lotka- Volterra Model</keyword>
            <keyword>Computer Attack Spread Rate</keyword>
            <keyword>Stability Point</keyword>
            <keyword>CII</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.7/</furl>
          <file>2022_1.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>82-97</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Admiral Makarov State University of Maritime and Inland Shipping</orgName>
              <surname>Ivanyuk</surname>
              <initials>Vladimir</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Sakharov</surname>
              <initials>Vladimir</initials>
              <email>saharovvv@gumrf.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">DIGITALIZATION AND IDENTIFICATION OF ECG SIGNALS USING WAVELET TECHNOLOGIES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A method for identifying signals based on the results of electrocardiogram (ECG) processing&#13;
performed based on wavelet technologies is considered. The use of digital technologies for processing&#13;
and diagnostics of ECG signals using wavelet analysis can significantly improve the efficiency&#13;
and quality of evaluation of pacemaker settings during implantation, as well as in the process of&#13;
correction of functional modes, diagnostics, in order to eliminate postoperative complications, etc.&#13;
Digital processing of complex cardiac signals at a qualitatively new level is an indispensable condition&#13;
for radically improving the processing of the current values of the diagnosed parameters, the&#13;
widespread use of digital tools for making informed and effective decisions in the field of medical&#13;
care, as well as for information support of identification processes. A method of approximation is&#13;
considered and an algorithm for analyzing ECG diagrams obtained during implantation and in the&#13;
process of choosing the modes of functioning of pacemakers based on the wavelet, transform is&#13;
given. The presence of high–frequency components and short-term pulses in the spectrum of ECG&#13;
signals, the evaluation of which is practically impossible by the traditionally used methods of spectral&#13;
analysis, determined the choice of a method for digitalizing the decomposition of signals into&#13;
basic frequency rhythms for parametric evaluation of QRS complexes. The approximation method&#13;
is based on the use of wavelet analysis, which allows deep investigation of such modes. Examples&#13;
of the use of wavelet analysis for the approximation of ECG diagrams using cubic splines whose&#13;
interpolation nodes are located on an uneven grid are given. Digital technologies are implemented&#13;
using the tools of the MATLAB computing environment</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/b4dd-gma4-epzv</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>electrocardiogram</keyword>
            <keyword>parametric estimation</keyword>
            <keyword>identification</keyword>
            <keyword>wavelet technologies</keyword>
            <keyword>Dobshy wavelets</keyword>
            <keyword>cubic spline</keyword>
            <keyword>signal reconstruction levels</keyword>
            <keyword>wavelet decomposition coefficients</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.8/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>98-105</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-8821-0456</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>UGATU</orgName>
              <surname>ZABIROV</surname>
              <initials>Ildar</initials>
              <email>Ildar.zabirov.lord@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-3096-3102</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ufa University of Science and Technology</orgName>
              <surname>Mashkina</surname>
              <initials>Irina</initials>
              <email>profmashkina@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">APPLYING OF IDENTIFICATION AND ACCESS CONTROL MANAGEMENT SYSTEM IN INDUSTRIAL CONTROL SYSTEM</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The possibility of using of Identity and access Management system (IdM/IAM) is considered&#13;
in the paper to automate users account and access rights management in Industrial Control&#13;
System (ICS). The main feature of IdM/IAM system is that they require an individual approach and&#13;
ongoing support when implemented in ICS. The results of the role-based access model development&#13;
are presented for its implementation in IdM/IAM. An analysis of ICS safety has been carried&#13;
out and the article provides a list of the information assets and information subjects representing&#13;
the function, or roles, of industrial network users. A hierarchy of users roles and an access matrix&#13;
(with possible rights) have been developed.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/z3tz‑82ax-h4zt</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Industrial control system</keyword>
            <keyword>information assets</keyword>
            <keyword>information subjects</keyword>
            <keyword>access control</keyword>
            <keyword>user account and rights management</keyword>
            <keyword>hierarchy of users roles</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.9/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>106-124</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6071-8087</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Yakunin</surname>
              <initials>Vladimir</initials>
              <email>Yavi1957@mil.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2233-811X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Sukhov</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-1404-6125</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after S. M. Shtemenko</orgName>
              <surname>Krupenin</surname>
              <initials>Alexander</initials>
              <email>19am87@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">THE METHOD OF MODELING THE PROCESS OF FUNCTIONING OF AN AUTOMATED SYSTEM OF SPECIAL PURPOSE IN CONDITIONS OF DESTRUCTIVE INFLUENCES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article describes a method associated with the construction of mathematical models&#13;
of quality indicators for further evaluation of the process of functioning of an automated system for&#13;
special purposes, taking into account destructive influences. Methods for calculating the performance&#13;
indicators of complex systems are presented. The features of the construction of analytical&#13;
and simulation models are disclosed. Algorithms for modeling of the designed automated systems&#13;
of special purpose are constructed.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/p25a-xtp4-argx</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Mathematical Model</keyword>
            <keyword>Quality Indicator</keyword>
            <keyword>Method</keyword>
            <keyword>Algorithm</keyword>
            <keyword>Destructive Impact</keyword>
            <keyword>Automated System of Special Purpose</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.10/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>125-134</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6753-2181</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg Federal Research Center of Russian Science Academy</orgName>
              <surname>Lebedev</surname>
              <initials>Ilya</initials>
              <email>isl_box@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1798-8257</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sukhoparov</surname>
              <initials>Mikhail</initials>
              <email>mail@sukhoparovm.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Improving the qualitative indicators of identifying the state of information security of individual&#13;
cyber-physical systems segments is associated with the processing of large information&#13;
arrays. A method of splitting data samples is proposed to improve the quality of algorithms for classifying&#13;
information security states. Classification models are configured on training sets of examples&#13;
in which outliers, noisy data, and an imbalance of observed objects may be present, which affects the qualitative indicators of the results. At certain points in time, under the influence of the external environment, the frequency of occurrence of observed events, the ranges of recorded values may&#13;
change, which significantly affects the quality indicators. It is shown that a number of events in the&#13;
samples occur as a result of the actions of internal and external factors.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mzv1-edk4-v7eb</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>machine learning</keyword>
            <keyword>dataset</keyword>
            <keyword>influencing factors</keyword>
            <keyword>the formation of data samples</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.11/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>135-147</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0623-9891</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gololobov</surname>
              <initials>Nikita</initials>
              <email>gololobov_nv@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes the use of recurrent neural networks with the LSTM architecture for&#13;
solving problems related to the detection of anomalous instances in data sets and compares the&#13;
effectiveness of the proposed method with the traditional technique – the support vector machine&#13;
for one class. During the study, an experiment was conducted and criteria for the effectiveness of&#13;
implementations were formulated. The results obtained in this way made it possible to draw appropriate&#13;
conclusions about the applicability of recurrent neural networks in the tasks of detecting&#13;
anomalous instances and put forward proposals for the further development of this direction</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/hmuz-b8ua-mv2e</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>anomaly detection; machine learning; support vector method; recurrent neural networks; LSTM; learning without a teacher; recurrent neural networks</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.12/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>148-159</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>RUDNICKAYA</surname>
              <initials>Ekaterina</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper is about the adversarial attacks on machine learning systems that analyze&#13;
medical images. The authors review the existing attacks, conducts their systematization and practical&#13;
feasibility. The article contains an analysis of existing methods of protection against adversarial&#13;
attacks on machine learning systems. It describes the peculiarities of medical images. The&#13;
authors solve the problem of protection against adversarial attacks for these images based on several&#13;
defensive methods. The authors have determined the most relevant protection methods, their&#13;
implementation and testing on practical examples – the analysis of COVID‑19 patient’s images</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1rgd-dmhp-rd2k</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>attacks on machine learning systems</keyword>
            <keyword>machine learning system protection</keyword>
            <keyword>adversarial attacks</keyword>
            <keyword>medical images</keyword>
            <keyword>machine learning</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.7.13/</furl>
          <file>2022_2_rus.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
