{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T21:11:44Z","timestamp":1766178704046,"version":"3.48.0"},"reference-count":18,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"vor","delay-in-days":320,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004561","name":"Ministry of Education and Science of the Republic of Kazakhstan","doi-asserted-by":"publisher","award":["BR20280990"],"award-info":[{"award-number":["BR20280990"]}],"id":[{"id":"10.13039\/501100004561","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1016\/j.procs.2024.11.153","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T07:18:21Z","timestamp":1733469501000},"page":"585-590","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Enhancing information Security Audits in Enterprise Systems with a Recommendation Generation Process"],"prefix":"10.1016","volume":"251","author":[{"given":"Suleimen","family":"Kaimov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Talgat","family":"Kaiym","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nazym","family":"Kanagatova","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maksat","family":"Kalimoldayev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aidarkhan","family":"Kaimov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Talgat","family":"Mazakov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2024.11.153_bib0001","unstructured":"Hinson, G. 2008. Frequently Avoided Questions about IT Auditing. Available: http:\/\/www.isect.com\/html\/ca_faq.html"},{"key":"10.1016\/j.procs.2024.11.153_bib0002","unstructured":"Val Thiagarajan, B.E. 2002. BS 7799 Audit Checklist. Available: www.sans.org\/score\/checklists\/ISO_17799_checklist.pdf"},{"key":"10.1016\/j.procs.2024.11.153_bib0003","unstructured":"ISO IEC 27002 2005 Information Security Audit Tool. Available: http:\/\/www.praxiom.com\/iso-17799-audit.htm"},{"key":"10.1016\/j.procs.2024.11.153_bib0004","series-title":"4th International Conference on Software and Data Technologies (ICSOFT 2009)","first-page":"326","article-title":"A knowledge Base For Justified Information Security Decision-Making","author":"Stepanova","year":"2009"},{"key":"10.1016\/j.procs.2024.11.153_bib0005","unstructured":"Giarratano, J., and Riley, G. eds. 2002. Expert Systems: Principles and Programming. Reading, Mass.: PWS Publishing Company."},{"year":"1990","series-title":"AudES - an Expert System for Security Auditing","author":"Tsudik","key":"10.1016\/j.procs.2024.11.153_bib0006"},{"key":"10.1016\/j.procs.2024.11.153_bib0007","series-title":"Proceedings of the 9th World Multiconference on Systemics, Cybernetics and Informatics (WMSCI 2005)","first-page":"3","article-title":"Expert system for the rational variant choice problem of the information security tools","author":"Akzhalova","year":"2005"},{"key":"10.1016\/j.procs.2024.11.153_bib0008","series-title":"Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems and the 13th International Symposium on Advanced Intelligent Systems","article-title":"Methodology and Ontology of Expert System for Information Security Audit","author":"Lyazzat","year":"2012"},{"key":"10.1016\/j.procs.2024.11.153_bib0009","unstructured":"ISO IEC 27002 2005 Information Security Audit Tool. Available: http:\/\/www.osvdb.org"},{"key":"10.1016\/j.procs.2024.11.153_bib0010","unstructured":"Standard ISO \/IEC 27001:2005 \u00abInformation Technology. Methods of protection. Information security management system. requirements\u00bb"},{"key":"10.1016\/j.procs.2024.11.153_bib0011","unstructured":"ITGI. \"COBIT 5 for Information Security\". COBIT 5 for information security"},{"key":"10.1016\/j.procs.2024.11.153_bib0012","unstructured":"Fril Systems Ltd (1999). Fril - Online Reference Manual - Preliminary Version (incomplete). Retrieved October 20, 2005."},{"key":"10.1016\/j.procs.2024.11.153_bib0013","series-title":"Proceedings of the 14th International Symposium on Advanced Intelligent Systems (ISIS2013)","article-title":"Building a Knowledge Base for Expert System in Information Security","author":"Atymtayeva","year":"2013"},{"key":"10.1016\/j.procs.2024.11.153_bib0014","series-title":"Proceedings of the 10th INTERNATIONAL CONFERENCE: INFORMATION TECHNOLOGIES AND MANAGEMENT 2012 Information Systems Management Institute","first-page":"98","article-title":"Using FRIL in Development of Expert System Applications","author":"Protsenko","year":"2012"},{"key":"10.1016\/j.procs.2024.11.153_bib0015","unstructured":"Vihorev SV The classification of information security threats Cnews.ru annual review of \"Network attacks and system information Safety 2001\"\/\/ http:\/\/www.elvis.ru\/informatorium_networks.shtml."},{"key":"10.1016\/j.procs.2024.11.153_bib0016","unstructured":"ISO IEC 27002 2005 Information Security Audit Tool. Available: http:\/\/www.pentest-tools.com"},{"key":"10.1016\/j.procs.2024.11.153_bib0017","series-title":"Proceedings of the International conference of Computational Intelligence and Intelligent Systems 2012","first-page":"725","article-title":"Some Issues of Development of Intelligent System for Information Security Auditing","volume":"2","author":"Atymtayeva","year":"2012"},{"key":"10.1016\/j.procs.2024.11.153_bib0018","series-title":"Proc. of the 5th International Conference October","first-page":"87","article-title":"Development","author":"Atymtaeva","year":"2011"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924033878?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924033878?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T14:59:45Z","timestamp":1766156385000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050924033878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":18,"alternative-id":["S1877050924033878"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.153","relation":{},"ISSN":["1877-0509"],"issn-type":[{"type":"print","value":"1877-0509"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing information Security Audits in Enterprise Systems with a Recommendation Generation Process","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.153","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}