<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Program Committee</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Preface</p>
    </sec>
    <sec id="sec-2">
      <title>Preface</title>
      <p>This volume contains the papers presented at the AISMA-2021:
International Workshop on Advanced in Information Security Management and
Applications held on October 1, 2021 in Stavropol, Krasnoyarsk and online.</p>
      <p>The International Workshop on Advanced in Information Security
Management and Applications aims at bringing together scientists with interests in
this field to present recent innovations, find topics of common interest and to
stimulate further development of new approaches that greatly make eficient the
work of an information security management.</p>
      <p>Main topics include (but are not limited to): AI model training in
information security, Blockchain technologies, Cryptography and applications,
Information risk analysis and applications, Information security awareness and
applications, Information security in education, Information security in
Internet of Things, Machine learning in information security, Threat detection UAV
security control systems.</p>
      <p>Submission of papers, review and preparation of proceeding was carried
out using a conference management system EasyChair. Research papers
appearing in this volume were selected after a blind peer-reviewing by at least two
reviewers. The workshop attracted 67 contributions of which 19 papers were
accepted for presentation. Additionally, it included 2 invited talks given by
Mauro Conti, University of Padua, Italy ”Side and Covert Channels” and Elena
Basan, Southern Federal University, Taganrog, Russia ”Analysis of the Impact
of a GPS Spoofing Attack on a UAV”.</p>
      <p>The workshop, was finally held in Stavropol, Krasnoyarsk and online due
to the COVID pandemic hitting all around the world during 2020-2021.</p>
      <p>We would like to thank all the authors for their submissions, and our
Program Committee members and additional reviewers for their precious work.</p>
      <p>October 1, 2021
Online
Stavropol, Krasnoyarsk, Russia</p>
    </sec>
    <sec id="sec-3">
      <title>Co-chairs of the conference:</title>
      <p>Prof. Fabrizio d’Amore,
Sapienza Universiat` di Roma,
Rome, Italy</p>
      <p>Prof. Maria Lapina
North-Caucasus Federal</p>
      <p>University,</p>
      <p>Stavropol, Russia
Prof. Vyacheslav Zolotarev
Reshetnev Siberian State
University of Science and</p>
      <p>Technology,
Krasnoyarsk, Russia
Program Committee</p>
      <sec id="sec-3-1">
        <title>Co-Chairs of the Program Committee:</title>
        <p>• Fabrizio d’Amore, Sapienza - Universiat` di Roma, Rome, Italy
• Maria Lapina, North-Caucasus Federal University, Stavropol, Russia
• Vyacheslav Zolotarev, Reshetnev Siberian State University of Science and</p>
        <p>Technology, Krasnoyarsk, Russia</p>
      </sec>
      <sec id="sec-3-2">
        <title>The members of the Program Committee:</title>
        <p>• Ivan Azarov, North-Caucasus Federal University, Stavropol, Russia
• Anastasia Arkhipova, Novosibirsk State Technical University, Novosibirsk,</p>
        <p>Russia
• Elena Basan, Southern Federal University, Taganrog, Russia
• Roman Voronkin, North-Caucasus Federal University, Stavropol, Russia
• Carlos Grilo, Polytechnic of Leiria, Leiria, Portugal
• Yevgenia Ishchukova, Southern Federal University, Taganrog, Russia
• Elena Maksimova, Russian Technological University, Moscow, Russia
• Ekaterina Maro, Southern Federal University, Taganrog, Russia
• Massimo Mecella, Sapienza - Universiat` di Roma, Rome, Italy
• Evgeny Kostyuchenko, Tomsk State University of Control Systems and</p>
        <p>Radioelectronics, Tomsk, Russia
• Dmitrii Orel, North-Caucasus Federal University, Stavropol, Russia
• Ekaterina Pakulova, Southern Federal University, Rostov-on-Don, Russia
• Denis Parfenov, Orenburg State University, Orenburg, Russia
• Nikolai Parotkin, Reshetnev Siberian State University of Science and</p>
        <p>Technology, Krasnoyarsk, Russia
• Peter Peer, University of Ljubljana, Ljubljana, Slovenia
• Olga Peskova, Southern Federal University, Taganrog, Russia
• Vyacheslav Petrenko, North-Caucasus Federal University, Stavropol, Russia
• G S Prakasha, Christ University, Central Campus, India
• Fernando da Silva, Polytechnic of Leiria, Leiria, Portugal
• Marina Zhukova, Reshetnev Siberian State University of Science and</p>
        <p>Technology, Krasnoyarsk, Russia</p>
        <sec id="sec-3-2-1">
          <title>Invited Talk</title>
          <p>Analysis of The Impact of a GPS Spoofing Attack on a UAV . . . . . . . . . . . . . . 6-16</p>
          <p>Elena Basan, Maria Lapina, Oleg Makarevich and Massimo Mecella</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Research Papers</title>
          <p>Implementation of Behavioral Indicators in Threat Detection and User
Behavior Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-24</p>
          <p>Yegor Anashkin and Marina Zhukova
Multisociometrical Readiness Characteristics in Information Security
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-34</p>
          <p>Anastasiya Arkhipova
Development and Testing of The Information Security Protocol in the
Medical Cloud Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35-40
Liudmila Babenko, Evgenia Ishchukova, Dmitriy Alekseev and</p>
          <p>Alexander Shumilin
Analysis of Attacks on Robotic Operation System . . . . . . . . . . . . . . . . . . . . . . . . . 41-48
Elena Basan, Oleg Khabarov, Nikita Sushkin, Oleg Makarevich and
Ivan Azarov
Management System Based on PSIM and SIEM Systems . . . . . . . . . . . . . . . . . . 127-136</p>
          <p>Dmitrii Orel and Tatiana Guseva
Reward Shaping for Deep Reinforcement Learning in VizDoom . . . . . . . . . . . . 157-169</p>
          <p>Vitalii Sopov and Ilya Makarov</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>Factors afecting Data-Privacy Protection and Promotion of Safe Digital</article-title>
          <string-name>
            <surname>Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>49</volume>
          -58
          <string-name>
            <given-names>Rituparna</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G S</given-names>
            <surname>Prakasha and C K</surname>
          </string-name>
          <article-title>Sripavithra</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>Development of Algorithms for Increasing the Information Secrecy of the Satellite Communication System Based on the Use of Authentication</article-title>
          <string-name>
            <surname>Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>59</volume>
          -64
          <string-name>
            <given-names>Nikita</given-names>
            <surname>Chistousov</surname>
          </string-name>
          , Igor Kalmykov, Aleksandr Olenev and Natalya Kalmykova
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A Online</given-names>
            <surname>Discoverability of Exposed Industrial Control</surname>
          </string-name>
          <string-name>
            <surname>Systems . . . . . . . . . . .</surname>
          </string-name>
          <volume>65</volume>
          -79 Fabrizio d'Amore,
          <string-name>
            <given-names>Paolo</given-names>
            <surname>Forte</surname>
          </string-name>
          and Antonio Pisano
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Adversary</given-names>
            <surname>Profiling</surname>
          </string-name>
          and
          <article-title>Activity Emulation in the Process of Development and Evaluation of Information Security Threat</article-title>
          <string-name>
            <surname>Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>80</volume>
          -86
          <string-name>
            <given-names>Anna</given-names>
            <surname>Golushko</surname>
          </string-name>
          and Vadim Zhukov
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>Model of a Secure Virtual Environment for Managing Information Exchange in Scientific and Educational</article-title>
          <string-name>
            <surname>Organizations . . . . . . . . . . . . . . . . . . . . .</surname>
          </string-name>
          <volume>87</volume>
          -94
          <string-name>
            <given-names>Sergey</given-names>
            <surname>Lazarev</surname>
          </string-name>
          and Konstantin Rubtsov
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>