{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:14Z","timestamp":1740098954610,"version":"3.37.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672281"},{"type":"electronic","value":"9783319672298"}],"license":[{"start":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T00:00:00Z","timestamp":1504742400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67229-8_11","type":"book-chapter","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T21:53:54Z","timestamp":1504648434000},"page":"113-127","source":"Crossref","is-referenced-by-count":7,"title":["Development of a Support System for Managing the Cyber Security of Information and Communication Environment of Transport"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9695-4543","authenticated-orcid":false,"given":"Valeriy","family":"Lakhno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9453-0755","authenticated-orcid":false,"given":"Alexander","family":"Petrov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3731-4276","authenticated-orcid":false,"given":"Anton","family":"Petrov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,7]]},"reference":[{"issue":"12","key":"11_CR1","first-page":"1167","volume":"11","author":"M Al Hadidi","year":"2016","unstructured":"Al Hadidi, M., Ibrahim, Y., Lakhno, V., Korchenko, A., Tereshchuk, A., Pereverzev, A.: Intelligent systems for monitoring and recognition of cyber attacks on information and communication systems of transport. Int. Rev. Comput. Softw. 11(12), 1167\u20131177 (2016)","journal-title":"Int. Rev. Comput. Softw."},{"issue":"79","key":"11_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.15587\/1729-4061.2016.60711","volume":"1\/3","author":"V Lakhno","year":"2016","unstructured":"Lakhno, V., Grabarev, A.: Improving the transport cyber security under destructive impacts on information and communication systems. Eastern-Eur. J. Enterp. Technol. 1\/3(79), 4\u201311 (2016). doi:\n10.15587\/1729-4061.2016.60711","journal-title":"Eastern-Eur. J. Enterp. Technol."},{"key":"11_CR3","isbn-type":"print","volume-title":"Practical Design of Safety-Critical Systems","author":"W Dunn","year":"2002","unstructured":"Dunn, W.: Practical Design of Safety-Critical Systems. Reliability Press, Cambridge (2002). ISBN 0971752702","ISBN":"https:\/\/id.crossref.org\/isbn\/0971752702"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s10207-014-0254-9","volume":"14","author":"AA El Hassani","year":"2014","unstructured":"El Hassani, A.A., El Kalam, A.A., Bouhoula, A., Abassi, R., Ouahman, A.A.: Integrity-OrBAC: a new model to preserve critical infrastructures integrity. Int. J. Inf. Secur. 14(4), 367\u2013385 (2014). doi:\n10.1007\/s10207-014-0254-9","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"11_CR5","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/tsg.2011.2159818","volume":"2","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796\u2013808 (2011). doi:\n10.1109\/tsg.2011.2159818","journal-title":"IEEE Trans. Smart Grid"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Al-Jarrah, O., Arafat, A.: Network intrusion detection system using attack behavior classification. In: 2014 5th International Conference on Information and Communication Systems (ICICS), pp. 1\u20136 (2014). doi:\n10.1109\/iacs.2014.6841978","DOI":"10.1109\/iacs.2014.6841978"},{"issue":"9","key":"11_CR7","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.neucom.2013.04.038","volume":"121","author":"P Louvieris","year":"2013","unstructured":"Louvieris, P., Clewley, N., Liu, X.: Effects-based feature identification for network intrusion detection. Neurocomputing 121(9), 265\u2013273 (2013). doi:\n10.1016\/j.neucom.2013.04.038","journal-title":"Neurocomputing"},{"issue":"9(80)","key":"11_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.15587\/1729-4061.2016.66015","volume":"2","author":"V Lakhno","year":"2016","unstructured":"Lakhno, V.: Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering. Eastern-Eur. J. Enterp. Technol. 2(9(80)), 18\u201325 (2016). doi:\n10.15587\/1729-4061.2016.66015","journal-title":"Eastern-Eur. J. Enterp. Technol."},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., Thuraisingham, B.: A new intrusion detection system using support vector machines and hierarchical clustering. Int. J. Very Large Data Bases 16(4), 507\u2013521 (2007). doi:\n10.1007\/s00778-006-0002-5","journal-title":"Int. J. Very Large Data Bases"},{"issue":"2","key":"11_CR10","doi-asserted-by":"crossref","first-page":"281","DOI":"10.2753\/MIS0742-1222250211","volume":"25","author":"H Cavusoglu","year":"2008","unstructured":"Cavusoglu, H., Srinivasan, R., Wei, T.Y.: Decision-theoretic and game-theoretic approaches to IT security investment. J. Manag. Inf. Syst. (ACySe) 25(2), 281\u2013304 (2008)","journal-title":"J. Manag. Inf. Syst. (ACySe)"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Chang, L.-Y., Lee, Z.-J.: Applying fuzzy expert system to information security risk assessment: a case study on an attendance system. In: 2013 International Conference on Fuzzy Theory and Its Applications (iFUZZY), pp. 346\u2013351 (2013). doi:\n10.1109\/iFuzzy.2013.6825462","DOI":"10.1109\/iFuzzy.2013.6825462"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"Atymtayeva, L., Kozhakhmet, K., Bortsov, G.: Building a knowledge base for expert system in information security. In: Soft Computing in Artificial Intelligence. Advances in Intelligent Systems and Computing, vol. 270, pp. 57\u201376 (2014). doi:\n10.1007\/978-3-319-05515-2_7","DOI":"10.1007\/978-3-319-05515-2_7"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Kanatov, M., Atymtayeva, L., Yagaliyeva, B.: Expert systems for information security management and audit. Implementation phase issues. In: Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 3\u20136 December 2014, pp. 896\u2013900 (2014). doi:\n10.1109\/SCIS-ISIS.2014.7044702","DOI":"10.1109\/SCIS-ISIS.2014.7044702"},{"key":"11_CR14","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.ins.2011.09.012","volume":"232","author":"YPO Yang","year":"2013","unstructured":"Yang, Y.P.O., Shieh, H.M., Tzeng, G.H.: A VIKOR technique based on DEMATEL and ANP for information security risk control assessment. Inf. Sci. 232, 482\u2013500 (2013). \nhttp:\/\/dx.doi.org\/10.1016\/j.ins.2011.09.012S","journal-title":"Inf. Sci."},{"issue":"2","key":"11_CR15","first-page":"730","volume":"6","author":"N Pawar","year":"2013","unstructured":"Pawar, N.: Intrusion detection in computer network using genetic algorithm approach: a survey. Int. J. Adv. Eng. Technol. 6(2), 730\u2013736 (2013)","journal-title":"Int. J. Adv. Eng. Technol."},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Linda, O., Manic, M., Vollmer, T., Wright, J.: Fuzzy logic based anomaly detection for embedded network security cyber sensor. In: IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 11\u201315 April 2011, pp. 202\u2013209 (2011). doi:\n10.1109\/cicybs.2011.5949392","DOI":"10.1109\/cicybs.2011.5949392"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Mashkina, I.V., Guzairov, M.B., Vasilyev, V.I., Tuliganova, L.R., Konovalov, A.S.: Issues of information security control in virtualization segment of company information system. In: XIX IEEE International Conference on Soft Computing and Measurements, pp. 161\u2013163 (2016). doi:\n10.1109\/SCM.2016.7519715","DOI":"10.1109\/SCM.2016.7519715"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Oglaza, A., Laborde, R., Zarate, P.: Authorization policies: using decision support system for context-aware protection of user\u2019s private data. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 16\u201318 July 2013 (2013). doi:\n10.1109\/TrustCom.2013.202","DOI":"10.1109\/TrustCom.2013.202"},{"issue":"81","key":"11_CR19","doi-asserted-by":"publisher","first-page":"30","DOI":"10.15587\/1729-4061.2016.71769","volume":"3\/9","author":"V Lakhno","year":"2016","unstructured":"Lakhno, V., Kazmirchuk, S., Kovalenko, Y., Myrutenko, L., Zhmurko, T.: Design of adaptive system of detection of cyber-attacks, based on the model of logical procedures and the coverage matrices of features. Eastern-Eur. J. Enterp. Technol. 3\/9(81), 30\u201338 (2016). doi:\n10.15587\/1729-4061.2016.71769","journal-title":"Eastern-Eur. J. Enterp. Technol."},{"issue":"6","key":"11_CR20","first-page":"505","volume":"4","author":"MM Gamal","year":"2011","unstructured":"Gamal, M.M., Hasan, B., Hegazy, A.F.: A security analysis framework powered by an expert system. Int. J. Comput. Sci. Secur. (IJCSS) 4(6), 505\u2013527 (2011)","journal-title":"Int. J. Comput. Sci. Secur. (IJCSS)"},{"issue":"1","key":"11_CR21","first-page":"13","volume":"1","author":"K Goztepe","year":"2012","unstructured":"Goztepe, K.: Designing fuzzy rule based expert system for cyber security. Int. J. Inf. Secur. Sci. 1(1), 13\u201319 (2012)","journal-title":"Int. J. Inf. Secur. Sci."},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"Gutzwiller, S.R., Hunt, S.M., Lange, D.S.: A task analysis toward characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts. In: IEEE International Multi-disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 21\u201325 March 2016. doi:\n10.1109\/COGSIMA.2016.7497780","DOI":"10.1109\/COGSIMA.2016.7497780"},{"issue":"3","key":"11_CR23","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.dss.2011.02.013","volume":"51","author":"LP Reesa","year":"2011","unstructured":"Reesa, L.P., Deanea, J.K., Rakesa, T.R., Bakerb, W.H.: Decision support for cybersecurity risk planning. Decis. Support Syst. 51(3), 493\u2013505 (2011). doi:\n10.1016\/j.dss.2011.02.013","journal-title":"Decis. Support Syst."},{"issue":"19","key":"11_CR24","first-page":"57","volume":"60","author":"S Paliwal","year":"2012","unstructured":"Paliwal, S., Gupta, R.: Denial-of-Service, probing & remote to user (R2L) attack detection using genetic algorithm. Int. J. Comput. Appl. 60(19), 57\u201362 (2012)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"11_CR25","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1109\/tpwrd.2010.2046654","volume":"25","author":"NG Ericsson","year":"2010","unstructured":"Ericsson, N.G.: Cyber security and power system communication-essential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 25(3), 1501\u20131507 (2010). doi:\n10.1109\/tpwrd.2010.2046654","journal-title":"IEEE Trans. Power Deliv."},{"issue":"24","key":"11_CR26","first-page":"112","volume":"2","author":"A Storchak","year":"2013","unstructured":"Storchak, A.: Model assessment of information security based on multi-step process driven decision. Spec. Telecommun. Syst. Inf. Protect. 2(24), 112\u2013117 (2013)","journal-title":"Spec. Telecommun. Syst. Inf. Protect."},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Atymtayeva, L., Kozhakhmet, K., Bortsova, G.: Building a knowledge base for expert system in information security. In: Soft Computing in Artificial Intelligence. Advances in Intelligent Systems and Computing, vol. 270, pp. 57\u201376 (2014). doi:\n10.1007\/978-3-319-05515-2_7","DOI":"10.1007\/978-3-319-05515-2_7"},{"issue":"2","key":"11_CR28","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1109\/TPWRS.2012.2224144","volume":"28","author":"J Valenzuela","year":"2013","unstructured":"Valenzuela, J., Wang, J., Bissinger, N.: Real-time intrusion detection in power system operations. IEEE Trans. Power Syst. 28(2), 1052\u20131062 (2013). doi:\n10.1109\/TPWRS.2012.2224144","journal-title":"IEEE Trans. Power Syst."},{"issue":"6","key":"11_CR29","first-page":"1263","volume":"95","author":"VA Lakhno","year":"2017","unstructured":"Lakhno, V.A., Kravchuk, P.U., Mekhed, D.B., Mohylnyi, H.A., Donchenko, V.U.: Development of a support system for managing the cyber protection of an information object. J. Theor. Appl. Inf. Technol. 95(6), 1263\u20131272 (2017)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Kritikos, K., Massonet, P.: Security-based adaptation of multi-cloud applications. In: Data Privacy Management, and Security Assurance. Lecture Notes in Computer Science, vol. 9481, pp. 47\u201364 (2016). doi:\n10.1007\/978-3-319-29883-2_4","DOI":"10.1007\/978-3-319-29883-2_4"},{"key":"11_CR31","first-page":"19","volume":"3","author":"V Burachok","year":"2010","unstructured":"Burachok, V.: Algorithm for evaluating the degree of protection of special information and telecommunication systems. Inf. Secur. 3, 19\u201327 (2010)","journal-title":"Inf. Secur."},{"key":"11_CR32","volume-title":"Immune and Defensive Corporate Systems with Intellectual Identification of Threats","author":"O Petrov","year":"2016","unstructured":"Petrov, O., Borowik, B., Karpinskyy, M., Korchenko, O., Lakhno, V.: Immune and Defensive Corporate Systems with Intellectual Identification of Threats. \u015al\u0105ska Oficyna Drukarska, Pszczyna (2016)"}],"container-title":["Advances in Intelligent Systems and Computing","Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology \u2013 ISAT 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67229-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T21:56:29Z","timestamp":1504648589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67229-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,7]]},"ISBN":["9783319672281","9783319672298"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67229-8_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,7]]}}}