{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:50:43Z","timestamp":1742964643343,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031354663"},{"type":"electronic","value":"9783031354670"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35467-0_16","type":"book-chapter","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:02:04Z","timestamp":1686978124000},"page":"235-246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Flows Formalization for BSD Family Operating Systems Security Against Unauthorized Investigation"],"prefix":"10.1007","author":[{"given":"Maksym","family":"Lutskyi","sequence":"first","affiliation":[]},{"given":"Sergiy","family":"Gnatyuk","sequence":"additional","affiliation":[]},{"given":"Oleksii","family":"Verkhovets","sequence":"additional","affiliation":[]},{"given":"Artem","family":"Polozhentsev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"16_CR1","unstructured":"Gnatyuk, S.: Critical aviation information systems cybersecurity. In: Meeting Security Challenges Through Data Analytics and Decision Support. NATO Science for Peace and Security Series, D: Information and Communication Security, vol. 47, no. 3, pp. 308\u2013316. IOS Press Ebooks (2016)"},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/LCA.2015.2461215","volume":"15","author":"C Delimitrou","year":"2016","unstructured":"Delimitrou, C., Kozyrakis, C.: Security implications of data mining in cloud scheduling. IEEE Comput. Archit. Lett. 15(2), 109\u2013112 (2016). https:\/\/doi.org\/10.1109\/LCA.2015.2461215","journal-title":"IEEE Comput. Archit. Lett."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Kocher, P., Lee, R., McGraw, G., Raghunathan, A., Ravi, S.: Security as a new dimension in embedded system design. In: 41st Design Automation Conference, pp. 753\u2013760 (2004)","DOI":"10.1145\/996566.996771"},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"2687","DOI":"10.1109\/TII.2019.2939573","volume":"16","author":"K Kaur","year":"2020","unstructured":"Kaur, K., Garg, S., Kaddoum, G., Bou-Harb, E., Choo, K.R.: A big data-enabled consolidated framework for energy efficient software defined data centers in IoT setups. IEEE Trans. Ind. Inf. 16(4), 2687\u20132697 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2939573","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"21","key":"16_CR5","first-page":"3334","volume":"98","author":"Z Alimseitova","year":"2020","unstructured":"Alimseitova, Z., Adranova, A., Akhmetov, B., Lakhno, V., Zhilkishbayeva, G., Smirnov, O.: Models and algorithms for ensuring functional stability and cybersecurity of virtual cloud resources. J. Theor. Appl. Inf. Technol. 98(21), 3334\u20133346 (2020)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"16_CR6","first-page":"68","volume":"2923","author":"S Gnatyuk","year":"2021","unstructured":"Gnatyuk, S., Berdibayev, R., Avkurova, Z., Verkhovets, O., Bauyrzhan, M.: Studies on cloud-based cyber incidents detection and identification in critical infrastructure. CEUR Workshop Proc. 2923, 68\u201380 (2021)","journal-title":"CEUR Workshop Proc."},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"125630","DOI":"10.1109\/ACCESS.2020.3007355","volume":"8","author":"S Solms","year":"2020","unstructured":"Solms, S., Futcher, L.: Adaption of a secure software development methodology for secure engineering design. IEEE Access 8, 125630\u2013125637 (2020)","journal-title":"IEEE Access"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"77653","DOI":"10.1109\/ACCESS.2020.2989113","volume":"8","author":"JCS N\u00fa\u00f1ez","year":"2020","unstructured":"N\u00fa\u00f1ez, J.C.S., Lindo, A.C., Rodr\u00edguez, P.G.: A preventive secure software development model for a software factory: a case study. IEEE Access 8, 77653\u201377665 (2020)","journal-title":"IEEE Access"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"33735","DOI":"10.1109\/ACCESS.2020.2971000","volume":"8","author":"S Moyo","year":"2020","unstructured":"Moyo, S., Mnkandla, E.: A novel lightweight solo software development methodology with optimum security practices. IEEE Access 8, 33735\u201333747 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2971000","journal-title":"IEEE Access"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"19139","DOI":"10.1109\/ACCESS.2021.3052311","volume":"9","author":"R Khan","year":"2021","unstructured":"Khan, R., Khan, S., Khan, H., Ilyas, M.: Systematic mapping study on security approaches in secure software engineering. IEEE Access. 9, 19139\u201319160 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3052311","journal-title":"IEEE Access."},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"McGraw, G.: Software security: building security. In: 17th International Symposium on Software Reliability Engineering, pp. 6\u20136 (2006). https:\/\/doi.org\/10.1109\/ISSRE.2006.43","DOI":"10.1109\/ISSRE.2006.43"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Ostroumov, I., Kuzmenko, N.: Configuration analysis of European navigational aids network. In: Integrated Communications Navigation and Surveillance Conference (ICNS),\u00a0pp. 1\u20139 (2021). https:\/\/doi.org\/10.1109\/ICNS52807.2021.9441576","DOI":"10.1109\/ICNS52807.2021.9441576"},{"key":"16_CR13","first-page":"106","volume":"3077","author":"V Kuzmin","year":"2022","unstructured":"Kuzmin, V., Zaliskyi, M., Odarchenko, R., Petrova, Y.: New approach to switching points optimization for segmented regression during mathematical model building. CEUR Workshop Proc. 3077, 106\u2013122 (2022)","journal-title":"CEUR Workshop Proc."},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1615\/TelecomRadEng.v77.i3.30","volume":"77","author":"I Ostroumov","year":"2018","unstructured":"Ostroumov, I., Kuzmenko, N.: Compatibility analysis of multi signal processing in APNT with current navigation infrastructure. Telecommun. Radio Eng. 77, 211\u2013223 (2018)","journal-title":"Telecommun. Radio Eng."},{"key":"16_CR15","doi-asserted-by":"publisher","unstructured":"Solomentsev, O., Zaliskyi, M., Shcherbyna, O., Kozhokhina, O.: Sequential procedure of changepoint analysis during operational data processing. In: Microwave Theory and Techniques in Wireless Communications, pp. 168\u2013171 (2020). https:\/\/doi.org\/10.1109\/MTTW51045.2020","DOI":"10.1109\/MTTW51045.2020"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Information Technology for Education, Science, and Technics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35467-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T05:03:31Z","timestamp":1686978211000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35467-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031354663","9783031354670"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35467-0_16","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITEST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific-Practical Conference \"Information Technology for Education, Science and Technics\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cherkasy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itest2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itest.chdtu.edu.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}