{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:18:44Z","timestamp":1740100724954,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:00:00Z","timestamp":1633392000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:00:00Z","timestamp":1633392000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,5]]},"DOI":"10.1109\/picst54195.2021.9772181","type":"proceedings-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:44:09Z","timestamp":1652733849000},"page":"213-217","source":"Crossref","is-referenced-by-count":5,"title":["Assessing Approaches of IT Infrastructure Audit"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4816-9246","authenticated-orcid":false,"given":"Feodosiy","family":"Kipchuk","sequence":"first","affiliation":[{"name":"Borys Grinchenko Kyiv University,Dept. of Inform. and Cyber Security,Kyiv,Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"Volodymyr","family":"Sokolov","sequence":"additional","affiliation":[{"name":"Borys Grinchenko Kyiv University,Dept. of Inform. and Cyber Security,Kyiv,Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7775-6039","authenticated-orcid":false,"given":"Pavlo","family":"Skladannyi","sequence":"additional","affiliation":[{"name":"Borys Grinchenko Kyiv University,Dept. of Inform. and Cyber Security,Kyiv,Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2686-3854","authenticated-orcid":false,"given":"Dmytro","family":"Ageyev","sequence":"additional","affiliation":[{"name":"Kharkiv National University of Radioelectronics,V. V. Popovskiy Infocommunication Engineering Department,Kharkiv,Ukraine"}]}],"member":"263","reference":[{"year":"2017","key":"ref10"},{"journal-title":"PCI Security Standards Council The Payment Card Industry Data Security Standard v 3 2 1","year":"2018","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.CSWP.04162018"},{"journal-title":"CIS Controls v 8","year":"2021","key":"ref13"},{"journal-title":"Cryptocurrency Certification Consortium Cryptocurrency Security Standard","year":"2020","key":"ref14"},{"journal-title":"General Data Protection Regulation","year":"2018","key":"ref15"},{"journal-title":"HIPAA Administrative Simplification Part 164-Security and Privacy","year":"2013","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PICST47496.2019.9061376"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8632151"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(17)30060-0"},{"key":"ref4","article-title":"A New Traceability System for SMEs with Open Source Software","volume":"6","author":"uchida","year":"2009","journal-title":"2009 WSEAS Transactions on Business and Economics"},{"key":"ref3","first-page":"222","article-title":"Security Rating Metrics for Distributed Wireless Systems","author":"buriachok","year":"2019","journal-title":"8th International Conference on &#x201C;Mathematics Information Technologies Education&#x201D; (MoMLeT&DS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PICST51311.2020.9468103"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43070-2_29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/UkrMiCo52950.2021.9716705"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/AICT52120.2021.9628954"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS45141.2019.9065787"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2018.10143"},{"key":"ref9","first-page":"283","article-title":"Traffic monitoring and abnormality detection methods for decentralized distributed networks","volume":"2923","author":"ageyev","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/PICST47496.2019.9061551"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2019.8931384"},{"key":"ref21","first-page":"23","article-title":"Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies","author":"buriachok","year":"2020","journal-title":"Cybersecurity Providing in Information and Telecommunication Systems (CPITS)"}],"event":{"name":"2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T)","start":{"date-parts":[[2021,10,5]]},"location":"Kharkiv, Ukraine","end":{"date-parts":[[2021,10,7]]}},"container-title":["2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&amp;T)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9771384\/9772106\/09772181.pdf?arnumber=9772181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:38:03Z","timestamp":1655239083000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9772181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,5]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/picst54195.2021.9772181","relation":{},"subject":[],"published":{"date-parts":[[2021,10,5]]}}}