{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:00:11Z","timestamp":1743048011478,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030963071"},{"type":"electronic","value":"9783030963088"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96308-8_48","type":"book-chapter","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:15:41Z","timestamp":1648300541000},"page":"518-526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Approach for Constructing a Simulation Model for Dynamic Analysis of Information Security System"],"prefix":"10.1007","author":[{"given":"Ivan","family":"Gaidarski","sequence":"first","affiliation":[]},{"given":"Pavlin","family":"Kutinchev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,27]]},"reference":[{"issue":"3","key":"48_CR1","first-page":"297","volume":"6","author":"PS Suryateja","year":"2018","unstructured":"Suryateja, P.S.: Threats and vulnerabilities of cloud computing a review. Int. J. Comput. Sci. Eng. 6(3), 297\u2013302 (2018)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"48_CR2","volume-title":"Information Security the Complete Reference","author":"M Rhodes-Ousley","year":"2013","unstructured":"Rhodes-Ousley, M.: Information Security the Complete Reference, 2nd edn. The McGraw-Hill, New York (2013)","edition":"2"},{"key":"48_CR3","unstructured":"Lytinen, S., Railsback, S.: The evolution of agent-based simulation platforms - a review of NetLogo 5.0 and ReLogo. In: Proceedings of the Fourth International Symposium on Agent-Based Modeling and Simulation (21st European Meeting on Cybernetics and Systems Research [EMCSR 2012]) (2012)"},{"key":"48_CR4","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706073695","author":"S Railsback","year":"2006","unstructured":"Railsback, S., Lytinen, S., Jackson, S.: Agent-based simulation platforms: review and development recommendations. Railsback Associat. (2006). https:\/\/doi.org\/10.1177\/0037549706073695","journal-title":"Railsback Associat."},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-47884-1_16","volume-title":"Integrated Formal Methods","author":"S Kent","year":"2002","unstructured":"Kent, S.: Model driven engineering. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol. 2335, pp. 286\u2013298. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47884-1_16"},{"key":"48_CR6","series-title":"Simulation Foundations, Methods and Applications","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-319-03050-0_2","volume-title":"Distributed Simulation","author":"O Top\u00e7u","year":"2016","unstructured":"Top\u00e7u, O., Durak, U., O\u011fuzt\u00fcz\u00fcn, H., Yilmaz, L.: Model driven engineering. In: Distributed Simulation. SFMA, pp. 23\u201338. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-03050-0_2"},{"key":"48_CR7","doi-asserted-by":"publisher","unstructured":"Gaidarski, I.: Model driven development of information security system. Probl. Eng. Cybernet. Robot. 76, 47\u201362 (2021). Bulgarian Academy of Sciences. ISSN:2738-7356, DOI:https:\/\/doi.org\/10.7546\/PECR.76.21.04","DOI":"10.7546\/PECR.76.21.04"},{"issue":"3","key":"48_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1002\/sys.20008","volume":"7","author":"R Hilliard","year":"2004","unstructured":"Hilliard, R., Emery, D., Maier, M.: ANSI\/IEEE 1471 and systems engineering. Syst. Eng. 7(3), 257\u2013270 (2004). https:\/\/doi.org\/10.1002\/sys.20008","journal-title":"Syst. Eng."},{"key":"48_CR9","unstructured":"IEEE 1471. IEEE Recommended Practice for Architectural Description of Software-Intensive Systems. https:\/\/standards.ieee.org\/standard\/1471-2000.html. Accessed 11 Aug 2021"},{"key":"48_CR10","unstructured":"ISO\/IEC\/IEEE 42010:2011 \u2013 Systems and Software Engineering \u2013 Architecture Description. https:\/\/www.iso.org\/standard\/50508.html. Accessed 11 Aug 2021"},{"key":"48_CR11","doi-asserted-by":"publisher","unstructured":"Hilliard, R., Malavolta, I., Muccini, H., Pelliccione, P.: On the Composition and Reuse of Viewpoints across Architecture Frameworks, Joint Working IEEE\/IFIP Conference on Software Architecture and European Conference on Software Architecture 2012. ISBN:978-1-4673-2809-8. https:\/\/doi.org\/10.1109\/WICSA-ECSA.212.21","DOI":"10.1109\/WICSA-ECSA.212.21"},{"key":"48_CR12","unstructured":"Bezivin, J., Jouault, F., Valduriez, P.: On the need for megamodels. In: Proceedings of the OOPSLA\/GPCE: Best Practices for Model-Driven Software Development Workshop (2004)"},{"key":"48_CR13","unstructured":"CoSoSys Endpoint Protector. https:\/\/www.endpointprotector.com\/. Accessed 11 Aug 2021"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96308-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T13:22:26Z","timestamp":1648300946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96308-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030963071","9783030963088"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96308-8_48","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}