{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:30Z","timestamp":1767339510945},"reference-count":27,"publisher":"National Library of Serbia","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p>Currently, one of the big problems in the Internet is the counteraction against the spread of harmful information. The paper considers models, algorithms and a common technique for choosing measures to counter harmful information, based on an assessment of the semantic content of information objects under conditions of uncertainty. Methods of processing incomplete, contradictory and fuzzy knowledge are used. Two cases of the algorithm implementation to eliminate the uncertainties in the assessment and categorization of the semantic content of information objects are analyzed. The first case is focused on processing fuzzy data. The second case is based on using an artificial neural network. An experimental evaluation of the proposed technique have shown that the use of both cases makes it possible to eliminate uncertainties of any type and, thereby, to increase the efficiency of choosing measures to counter harmful information.<\/jats:p>","DOI":"10.2298\/csis210211057k","type":"journal-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T14:51:07Z","timestamp":1635778267000},"page":"415-433","source":"Crossref","is-referenced-by-count":4,"title":["An approach for selecting countermeasures against harmful information based on uncertainty management"],"prefix":"10.2298","volume":"19","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia"}]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia"}]},{"given":"Igor","family":"Parashchuk","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia"}]},{"given":"Elena","family":"Doynikova","sequence":"additional","affiliation":[{"name":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia"}]}],"member":"1078","reference":[{"key":"ref1","doi-asserted-by":"crossref","unstructured":"Parashchuk, I., Doynikova, E., Saenko, I., Kotenko, I.: Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty. In Proceeding of the 2020 International Conference on Innovations in Intelligent Systems and Applications (INISTA 2020), Novi Sad, Serbia, 1-7. (2020)","DOI":"10.1109\/INISTA49547.2020.9194680"},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"Vaismoradi, M., Turunen, H., Bondas, T.: Content Analysis and Thematic Analysis: Implications for Conducting a Qualitative Descriptive Study. Nursing & Health Sciences, Vol. 15, No. 3, 398-405. (2013)","DOI":"10.1111\/nhs.12048"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"Elo, S., Kyngas, H.: The Qualitative Content Analysis Process. Journal of Advanced Nursing, Vol. 62, No. 1, 107-115. (2008)","DOI":"10.1111\/j.1365-2648.2007.04569.x"},{"key":"ref4","unstructured":"Krippendorff, K.: Content Analysis: An Introduction to Its Methodology. Sage Publications, California, USA. (2004)"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"Graneheim, U. H., Lundman, B.: Qualitative Content Analysis in Nursing Research: Concepts, Procedures and Measures to Achieve Trustworthiness. Nurse Education Today, Vol. 24, No. 2, 105-112. (2004)","DOI":"10.1016\/j.nedt.2003.10.001"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"Pashakhanlou, H.: Fully Integrated Content Analysis in International Relations. International Relations, Vol. 31, No. 4, 447-465. (2017)","DOI":"10.1177\/0047117817723060"},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"Timmermans, S., Iddo, T.: Theory Construction in Qualitative Research: From Grounded Theory to Abductive Analysis. Sociological Theory, Vol. 30, No. 3, 167-186. (2012)","DOI":"10.1177\/0735275112457914"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"Marcus, S., Moy, M., Coffman, T.: Social Network Analysis. In: Cook, D. J., Holder, L. B. (eds.): Mining Graph Data. John Wisley & Sons, Hoboken. (2007)","DOI":"10.1002\/9780470073049.ch17"},{"key":"ref9","unstructured":"UCINET documentation (2017). [Online]. Available: https:\/\/sites.google.com\/site\/ucinetsoftware\/document (current February 2021)"},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"Scott, J.: Social Network Analysis: Developments, Advances, and Prospects. Social Network Analysis and Mining, Vol. 1, No. 1, 21-26. (2011)","DOI":"10.1007\/s13278-010-0012-6"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Qi, X., Davison, B. D.: Web Page Classification: Features and Algorithms. ACM Computing Surveys, Vol. 41, No. 2, 12:1-12:31. (2009)","DOI":"10.1145\/1459352.1459357"},{"key":"ref12","unstructured":"Patil, A., Pawar, B.: Automated Classification of Web Sites using Naive Bayessian Algorithm. In Proceedings of the International Multi-Conference of Engineers and Computer Scientists, Vol. 1, Hong Kong, 466-467. (2012)"},{"key":"ref13","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Chechulin, A., Shorov, A., Komashinsky, D.: Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. In: Perner, P. (ed.): Proceedings of the 14th Industrial Conference on Data Mining, Lecture Notes in Artificial Intelligence, Vol. 8557, 39-54. (2014)","DOI":"10.1007\/978-3-319-08976-8_4"},{"key":"ref14","doi-asserted-by":"crossref","unstructured":"Shibu, S., Vishwakarma, A., Bhargava, N.: A Combination Approach for Web Page Classification using Page Rank and Feature Selection Technique. International Journal of Computer Theory and Engineering, Vol. 2, No. 6, 897-900. (2010)","DOI":"10.7763\/IJCTE.2010.V2.259"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"Kan, M.-Y., Thi, H. O. N.: Fast Web Page Classification using URL Features. In Proceedings of the 14th ACM International Conference on Information and Knowledge Management, Bremen, Germany, 325-326. (2005)","DOI":"10.1145\/1099554.1099649"},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"Baykan, E., Henzinger, M., Marian, L., \u0412\u0435ber, I.: Purely URL-Based Topic Classification. In Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain, 1109-1110. (2009)","DOI":"10.1145\/1526709.1526880"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"Dumais, S., Chen, H.: Hierarchical Classification of Web Content. In Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Athens, Greece, 256-263. (2000)","DOI":"10.1145\/345508.345593"},{"key":"ref18","doi-asserted-by":"crossref","unstructured":"Calado, P., Cristo, M., Moura, E., Ziviani, N., Ribeiro-Neto, B., Goncalves, M. A.: Combining Link-Based and Content-Based Methods for Web Document Classification. In Proceedings of the 12th International Conference on Information and Knowledge Management, New York, New Orleans, LA, USA, 394-401. (2003)","DOI":"10.1145\/956863.956938"},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"Belmouhcine, A., Idrissi, A., Benkhalifa, M.: Web Classification Approach using Reduced Vector Representation Model Based on HTML Tags. Journal of Theoretical and Applied Information Technology, Vol. 55, No. 1, 137-148. (2013)","DOI":"10.1145\/2797115.2797125"},{"key":"ref20","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Chechulin, A., Komashinsky, D.: Categorisation of Web Pages for Protection against Inappropriate Content in the Internet. International Journal of Internet Protocol Technology, Vol. 10, No. 1, 61-71. (2017)","DOI":"10.1504\/IJIPT.2017.083038"},{"key":"ref21","unstructured":"Kriesel, D.: A Brief Introduction to Neural Networks. Cambridge University Press, Grate Britain. (2010)"},{"key":"ref22","unstructured":"Mehlig, B.: Artificial Neural Networks. University of Gothenburg, Sweden. (2019)"},{"key":"ref23","doi-asserted-by":"crossref","unstructured":"Rojas, R.: Neural Networks. Springer-Verlag, Germany. (1996)","DOI":"10.1007\/978-3-642-61068-4"},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"Parashchuk, I.: System Formation Algorithm of Communication Network Quality Factors using Artificial Neural Networks. In Proceedings of the 1st IEEE International Conference on Circuits and System for Communications, Saint-Petersburg, Russia, 263-266. (2002)","DOI":"10.1109\/OCCSC.2002.1029092"},{"key":"ref25","unstructured":"Kosko, B.: Neural Networks and Fuzzy Systems: A Dynamical Systems Approach to Machine Intelligence. Prentice-Hall, Englewood Cliffs, NJ, USA. (1992)"},{"key":"ref26","unstructured":"Kotenko, I., Saenko, I., Ageev, S., Kopchak, Y.: Abnormal Traffic Detection in Networks of the Internet of Things Based on Fuzzy Logical Inference. In Proceedings of the XVIII International Conference on Soft Computing and Measurements, Saint-Petersburg, Russia, 5-8. (2015)"},{"key":"ref27","unstructured":"Kotenko, I., Parashchuk, I., Omar, T.: Neuro-Fuzzy Models in Tasks of Intelligent Data Processing for Detection and Counteraction of Inappropriate, Dubious and Harmful Information. In Proceedings of the 2nd International Scientific-Practical Conference Fuzzy Technologies in the Industry, Ulyanovsk, Russia, 116-125. (2018)"}],"container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:51:40Z","timestamp":1726033900000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02142100057K"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.2298\/csis210211057k","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"type":"print","value":"1820-0214"},{"type":"electronic","value":"2406-1018"}],"subject":[],"published":{"date-parts":[[2022]]}}}