<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>3</number>
    <altNumber> </altNumber>
    <dateUni>2022</dateUni>
    <pages>1-167</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-23</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-6062-1966</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ryazan State University named for S. A. Yesenin</orgName>
              <surname>Fulin</surname>
              <initials>Vladimir</initials>
              <email>v.fulin@365.rsu.edu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2701-6972</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ryazan State University named for S. A. Yesenin</orgName>
              <surname>Ruchkin</surname>
              <initials>Vladimir</initials>
              <email>v.ruchkin@365.rsu.edu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-2984-4480</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ryazan State Radio Engineering University named for V. F. Utkin</orgName>
              <surname>KOSTROV</surname>
              <initials>Boris</initials>
              <email>kostrov.b.v@evm.rsreu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">INTELLECTUAL STRETEGY OF SECURITY ON BASE CHOSING OF ARCHITECTURE COMPUTING AND NEUROPROCESSING NETS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The research addresses four strategies of information security: the strategy game of chicken,&#13;
balance of business incentives and desire to “balance on the brink” (brinkmanship), formation ofsufficient security with minimal effort for customers and consumers, worsening, and in some cases improving security of its infrastructure and the Security Maturity Model (IoT SMM) is demonstrated.&#13;
The benefits of the latter strategy are assessed through choosing an architecture with the core of&#13;
the IoT security maturity model as a hierarchy of security practices. Algorithms for ensuring cyber&#13;
security and protection against threats are analysed. We propose a method for analysis and selection&#13;
of the best architecture for multicore hierarchical clustering of computing systems and implement&#13;
an expert system based on chip MCNPAoC SBIS 1879ВМ8Y chip module MC127.05, complete&#13;
with a user interface.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/b2pf-9hap-5rud</doi>
          <udk>004.032</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>defense strategies</keyword>
            <keyword>the game of chicken</keyword>
            <keyword>balance of business incentives</keyword>
            <keyword>infrastructure security</keyword>
            <keyword>Security Maturity Model</keyword>
            <keyword>architecture</keyword>
            <keyword>multicore</keyword>
            <keyword>hierarchical clustering</keyword>
            <keyword>expert system</keyword>
            <keyword>user interface</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.1/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>24-35</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9448-2386</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Novikov</surname>
              <initials>Pavel</initials>
              <email>novikov.p.ark@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-9665-2174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Samoilenko</surname>
              <initials>Dmitry</initials>
              <email>19sam@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-1122-3563</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>SOKOLOV</surname>
              <initials>Maxim</initials>
              <email>sasa_t@mail.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-6972-1768</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Chechin</surname>
              <initials>Ivan</initials>
              <email>chechin@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">MATHEMATICAL MODEL AND ALGORITHM FOR DATA INTEGRITY CONTROL BASED ON THE RULES OF CODE CONSTRUCTION WITH UNEQUAL CHARACTER PROTECTION</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Information and analytical systems are considered, the functioning of which is based on&#13;
the processing of multidimensional arrays of information in the conditions of destructive effects&#13;
of an attacker and environmental disturbances. A subsystem of data integrity control is proposed,&#13;
based on the use of redundant coding, in which the data to be protected is presented in the form&#13;
of blocks, pre-grouped according to the criterion of “information value” to ensure the correctness of&#13;
the user’s decision-making of an information and analytical system</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rdf2-peke-477e</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information protection</keyword>
            <keyword>data integrity control</keyword>
            <keyword>codes with unequal character protection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.2/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>36-44</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Fatin</surname>
              <initials>Aleksander</initials>
              <email>sasha-fatin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Eremenko</surname>
              <initials>Ilya</initials>
              <email>eremenko.is@edu.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">METHODS OF COMPUTER NETWORK CLUSTERING IN CYBERSECURITY TASKS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A comparative analysis of computer network clustering methods is presented. The purpose&#13;
of this study is to systematize, summarize, analyze and supplement the existing experience&#13;
in describing and solving the problems of information security of cyber-physical systems; to make&#13;
a general information basis for testing the considered methods on their own datasets and the subsequent&#13;
implementation of their own approach to computer network clustering in cybersecurity&#13;
tasks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/agrp-preh-v5bk</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>clustering</keyword>
            <keyword>information security models</keyword>
            <keyword>cyber-physical systems</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.3/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>45-54</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-5240-1744</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>NITKIN</surname>
              <initials>Ivan</initials>
              <email>exebopen@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9707-1571</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>TARANOV</surname>
              <initials>Sergey</initials>
              <email>serg.tvc@itmo.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">AN ASSESSMENT OF CIPHER KUZNYECHIK CRYPTOGRAPHIC STABILITY IN CASE OF IMPOSSIBLE DIFFERENTIALS METHOD ATTACKS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article contains the description of research undertaken to assess the block symmetric&#13;
cipher Kuznyechic cryptographic stability in case of impossible differentials method attacks. The&#13;
way to assess the simplified versions of Kuznyechic cryptographic stability in case of impossible&#13;
differentials method attacks was used to get the results. The results obtained were generalized for&#13;
the full version of the cipher Kuznyechic</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/66eh-1f2d-b8tb</doi>
          <udk>004.056.55</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cipher Kuznyechik</keyword>
            <keyword>cryptographic stability</keyword>
            <keyword>impossible differentials</keyword>
            <keyword>crypto-analysis</keyword>
            <keyword>GOST R 34.12-2018</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.4/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>55-67</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">SYSTEMATIZATION OF CYBER THREATS TO LARGE-SCALE SYSTEMS WITH ADAPTIVE NETWORK TOPOLOGY</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper focuses on the investigation and systematization of cyber threats to largescale&#13;
cyber-physical systems with dynamic network infrastructures. The proposed taxonomy&#13;
provides a unified view of the specifics of such systems in terms of security, attacker targets, and&#13;
TCP/IP network stack levels. Taken together, the systematization developed provides the basis for&#13;
a new technology to protect complex dynamic systems by providing knowledge of which networking&#13;
parameters need to be controlled to counteract certain classes of cyberthreats.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/47fa-khtg-gz5n</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>ad hoc networks</keyword>
            <keyword>MANET</keyword>
            <keyword>wireless sensor networks</keyword>
            <keyword>cyber threat</keyword>
            <keyword>TCP/IP stack</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.5/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>68-79</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A FUNCTIONING MODEL OF ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON DYNAMIC GRAPH THEORY</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper is devoted to developing a model capable of describing the process of functioning&#13;
of large-scale systems with dynamic, adaptive network topology. The mathematical apparatus&#13;
on which the model is based is dynamic graph theory, due to which the functioning of an ad hoc&#13;
network is represented as a set of static graphs, each of which corresponds to a certain timestamp.&#13;
Dynamic graphs allow changes in the network to be tracked and marked as legitimate or illegitimate.&#13;
The key parameters of the developed model were chosen based on the practical experience&#13;
of researchers involved in the detection of various attacks in ad hoc networks, which makes the&#13;
proposed model a priori oriented for subsequent security analysis</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/tn56-xvah-7tf1</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>ad hoc networks</keyword>
            <keyword>wireless sensor networks</keyword>
            <keyword>dynamic graph theory</keyword>
            <keyword>centrality metrics</keyword>
            <keyword>critical nodes</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.6/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>80-89</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2141-6780</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great Saint-Petersburg Polytechnic University</orgName>
              <surname>Shtyrkina</surname>
              <initials>Anna</initials>
              <email>anna_sh@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">THE SECURITY OF SMART GRID SYSTEMS BASED ON THE GRAPH STRUCTURAL PROPERTIES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes an approach to estimating the security of cyber-physical systems&#13;
based on the modeling graph structural characteristics. As structural characteristics of the graph, indicators&#13;
based on the spectrum of the graph were studied. To test the hypothesis about the negative&#13;
impact of attacking influences on the structure of the graph, experiments were carried out, consisting&#13;
in the sequential removal of vertices and edges from the graph with “small world” property. This type of graph was chosen because researches show that the “small world” property is inherent in high voltage smart grids. The conducted experiments showed that the attacking influences on the&#13;
system, displayed on the graph, negatively affect the structure of the network, and therefore lead to&#13;
inefficient information exchange and, consequently, the functioning of the system.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ugxe-5u1a-ka67</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cyberphysical systems</keyword>
            <keyword>smart grid</keyword>
            <keyword>graph theory</keyword>
            <keyword>graph entropy</keyword>
            <keyword>spectral graph theory</keyword>
            <keyword>«small-world» graph</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.7/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>90-95</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Research Institute of Communications</orgName>
              <surname>NEUSTROYEV</surname>
              <initials>Alexander</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-0990-3882</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>PJSC Rostelecom.</orgName>
              <surname>POLESHENKOV</surname>
              <initials>Dmitry</initials>
              <email>d.poleshenkov@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Research Institute of Communications</orgName>
              <surname>ZHURAVLEV</surname>
              <initials>Dmitry</initials>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0001-7523-0378</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ANO “Institute of Engineering Physics”</orgName>
              <surname>GRIBUNIN</surname>
              <initials>Vadim</initials>
              <email>wavelet2@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">CPU MICROARCHITECTURAL VULNERABILITIES IN THE CONTEXT OF JOINT APPLICATION OF HARDWARE FOR INFORMATION PROTECTION AND VIRTUALIZATION TECHNOLOGIES IN AUTOMATED SYSTEMS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article discusses the limitations of the combined use of information protection hardware&#13;
and virtualization technologies due to the presence of microarchitectural vulnerabilities in&#13;
processors. A conclusion is made about the possibility and boundary conditions for the safe use&#13;
of untrusted software in automated systems, where information is protected from unauthorized&#13;
access through the joint use of hardware information security modules and a trusted hypervisor.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/g652-z5x3-v5pa</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>automated systems</keyword>
            <keyword>virtualization technologies</keyword>
            <keyword>processor microarchitectural vulnerabilities</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.8/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>96-120</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-8786-5661</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Fedosenko</surname>
              <initials>Maxim</initials>
              <email>fedosenkomaksim98@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Fedorov</surname>
              <initials>Ivan</initials>
              <email>ivanfedorov@itmo.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">THE PERSPECTIVE FOR INTRODUCTION OF BLOCKCHAIN TECHNOLOGY INTO THE PRODUCTION PROCESSES OF RUSSIAN COMPANIES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article considers cases of implementation blockchain technology in Russian Federation.&#13;
Description of Russian software products in the field of distributed registries and their usage&#13;
by Russian business representatives is given. Also, this paper described features of Ethereum and&#13;
Hyperledger blockchain separately and within development of platforms Masterchain and Waves&#13;
Enterprise. The technologies given in the article are related (in particular) to private blockchains.&#13;
A review of the integration of these technologies in the following companies was carried out: Gazprom,&#13;
Nornickel, Rosseti, Sberbank, Alfa-Bank, S7 Airlines and OR Group. Their examples describe&#13;
the stages of introducing blockchain technology into production processes, approaches used for&#13;
implementation and future development prospects. In the end were drawn conclusions about the&#13;
relevance of the technology, areas of its usage and the necessity to comply with the requirements&#13;
of fault tolerance and information security.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/np9u-h6dk-px96</doi>
          <udk>004.005</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Blockchain</keyword>
            <keyword>Cryptography</keyword>
            <keyword>Hash Function</keyword>
            <keyword>Private Blockchain</keyword>
            <keyword>Masterchain</keyword>
            <keyword>Waves Enterprise</keyword>
            <keyword>Hyperledger</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.9/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>121-129</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-7199-6384</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Special Technology Center LLC</orgName>
              <surname>Kurakin</surname>
              <initials>Alexander </initials>
              <email>akurakin@stc-spb.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A MODEL OF DIFFERENTIATION OF ACCESS RIGHTS FOR A VIRTUAL SQUAD OF UNMANNED AERIAL VEHICLES</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to the concept of a virtual squad of unmanned aerial vehicles. This&#13;
concept allows us to solve the problem of differentiation of access rights to information system&#13;
resources.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/zmdf-8eb6-62gd</doi>
          <udk>004.78</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>unmanned aerial vehicles</keyword>
            <keyword>virtual squad</keyword>
            <keyword>differentiation of access rights</keyword>
            <keyword>model of neural network interaction</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.10/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>130-142</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-6377-5581</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Baryshnikov</surname>
              <initials>Sergey</initials>
              <email>barychnikovso@gumrf.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Admiral S.O. Makarov State University of Marine and River Fleet</orgName>
              <surname>Sakharov</surname>
              <initials>Vladimir</initials>
              <email>saharovvv@gumrf.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">SYNTHESIS OF AN OBSERVER FOR THE SHIP’S COURSE CONTROL SYSTEM</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Digitalization of technological processes on ships using the tools of modern computing&#13;
systems allows solving important technical problems at a qualitatively new level, improving information&#13;
support and monitoring of the technical condition of ships and ship technical systems&#13;
based on dynamic observers and evaluators. A method for synthesizing observers for a ship’s course&#13;
control system based on the theory of modal regulators is considered. The models for assessing&#13;
the operational performance of ship control systems are based on the application of a generalized&#13;
mathematical model, which can take various forms depending on the influence of numerous factors&#13;
on its structure and parameters.&#13;
The adequacy of the dynamics of simple models and an object functioning in a changing external&#13;
environment can be improved with modern algorithms for analysis, synthesis and optimization of&#13;
automatic systems, tools of computing environments and computer technologies using the basic&#13;
&#13;
provisions of modal control. The method of synthesis of a dynamic observer considered in the&#13;
paper is The Luenberger model of full dimension differs in that it takes into account the structure&#13;
of the matrix of the state of the ship model with the Ackerman regulator, which allows, subject to&#13;
the conditions of controllability and observability, the choice of the structure of the stabilizing part&#13;
of the observer matrix in the form of column vectors with non–zero elements, which significantly&#13;
simplifies the synthesis procedure. The regulator and observers were calculated to estimate the&#13;
vector of state variables of the supertanker with a deadweight of 150 thousand tons.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mvk8-vvmm-295m</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>vessel</keyword>
            <keyword>control</keyword>
            <keyword>modal controller</keyword>
            <keyword>observer</keyword>
            <keyword>exit and state vectors</keyword>
            <keyword>algorithm</keyword>
            <keyword>generalized matrix</keyword>
            <keyword>model.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.11/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>143-154</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-4231-9805</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Federal State Autonomous Educational Institution of Higher Education «Siberian Federal University»</orgName>
              <surname>SHNIPEROV</surname>
              <initials>Alexey</initials>
              <email>ashniperov@sfu-kras.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2475-7820</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Federal State Autonomous Educational Institution of Higher Education «Siberian Federal University»</orgName>
              <surname>POTYLITSINA</surname>
              <initials>Yulia</initials>
              <email>ypotylitsina@sfu-kras.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">VOICE IDENTIFICATION METHOD BASED ON MACHINE LEARNING</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents a voice identification method based on machine learning. The general&#13;
algorithm of voice identification is considered. The results of the analysis of common solutions in&#13;
the area of voice identification are presented. The use of cepstral transformations and deep learning&#13;
methods for convolutional neural networks is proposed. A software prototype has been developed&#13;
and the results of its testing have been presented. The results of evaluating the effectiveness of the&#13;
developed method are presented</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ze3e-rae5-tpr3</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>biometric identification</keyword>
            <keyword>classification</keyword>
            <keyword>machine learning</keyword>
            <keyword>neural network</keyword>
            <keyword>algorithm</keyword>
            <keyword>MFCC</keyword>
            <keyword>CNN.</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.12/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>155-166</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>KRASNIKOV</surname>
              <initials>Nikita</initials>
              <email>nekit.kras24@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-5221-7621</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Elina</surname>
              <initials>Tatyana</initials>
              <email>elinatn@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The problem of distortion and substitution of information when performing transactions&#13;
in retail trade using self-service checkouts leads to a decrease in the profits of enterprises. The introduction&#13;
of weight recognition tools using machine-learning methods will increase the level of&#13;
protection for retail transactions. The paper analyzes various training methods and builds a network&#13;
model that allows, with a small amount of labeled data, to obtain good recognition results in the&#13;
field of retail.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kdh3-g5ak-bv4v</doi>
          <udk>004.85; 004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>convolutional neural networks</keyword>
            <keyword>machine learning</keyword>
            <keyword>retail information security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2022.8.13/</furl>
          <file>2022_3_short.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
