{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:00:07Z","timestamp":1773655207142,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.3103\/s0146411618080278","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T10:50:13Z","timestamp":1551955813000},"page":"918-930","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems"],"prefix":"10.3103","volume":"52","author":[{"given":"P. D.","family":"Zegzhda","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Poltavtseva","sequence":"additional","affiliation":[]},{"given":"A. I.","family":"Pechenkin","sequence":"additional","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]},{"given":"E. A.","family":"Zaitseva","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"7061_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b10867","volume-title":"Data Mining and Machine Learning in Cybersecurity","author":"S. Dua","year":"2011","unstructured":"Dua, S. and Du, X., Data Mining and Machine Learning in Cybersecurity, Taylor and Francis Group, LLC, 2011."},{"key":"7061_CR2","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1023\/A:1006624031083","volume":"14","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J. and Mok, K.W., Adaptive intrusion detection: A data mining approach, Artif. Intell. Rev., 2000, vol. 14, no. 6, pp. 533\u2013567. doi 10.1023\/A:1006624031083","journal-title":"Artif. Intell. Rev."},{"key":"7061_CR3","doi-asserted-by":"crossref","unstructured":"Dasgupta, D. and Gonzalez, F.A., An intelligent decision support system for intrusion detection and response, Information Assurance in Computer Networks. MMM-ACNS 2001; Lect. Notes Comput. Sci., 2001, vol 2052.","DOI":"10.1007\/3-540-45116-1_1"},{"key":"7061_CR4","unstructured":"Eremenko, N.N. and Kokoulin, A.N., Study of penetration testing methods in information systems, Master\u2019s J., 2016, no. 2, pp. 181\u2013186."},{"key":"7061_CR5","doi-asserted-by":"crossref","unstructured":"Bertoglio, D.D. and Zorzo, A.F., Overview and open issues on penetration test, J. Braz. Comput. Soc., 2017, no. 23, p. 2.","DOI":"10.1186\/s13173-017-0051-1"},{"key":"7061_CR6","unstructured":"Tumanov, S.A., Means of penetration testing of information systems, Dokl. Tomsk. Gos. Univ. Sist. Upr. Radioelektron., 2015, no. 2, pp. 73\u201379."},{"key":"7061_CR7","unstructured":"Zhukov, V.G. and Shalyapin, A.A., Precedent analysis of information security incidents, Sib. Zh. Nauki Tekhnol., 2013, no. 2."},{"key":"7061_CR8","unstructured":"Richter, M.M. and Weber, R., Case-Based Reasoning, Springer-Verlag Berlin Heidelberg, 2013. https:\/\/doi.org\/ 10.1007\/978-3-642-40167-1"},{"key":"7061_CR9","doi-asserted-by":"publisher","first-page":"985","DOI":"10.3103\/S014641161708017X","volume":"51","author":"M.A. Poltavtseva","year":"2017","unstructured":"Poltavtseva, M.A. and Pechenkin, A.I., Intelligent data analysis in decision support systems for penetration tests, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 985\u2013991.","journal-title":"Autom. Control Comput. Sci."},{"key":"7061_CR10","unstructured":"Vasil\u2019ev, V.I., Pestrikov, V.A., and Kras\u2019ko, A.S., Intelligent support of decision-making in extreme situations based on the conclusion by precedents, Izv. Yuzhn. Fed. Univ., Tekh. Nauki, 2008, no. 8, pp. 7\u201314."},{"key":"7061_CR11","unstructured":"Nikolaichuk, O.A., Knowledge modeling for studying the dynamics of the technical state of unique objects, Probl. Upr., 2009, no. 4, pp. 58\u201365."},{"key":"7061_CR12","unstructured":"Desktop Operating System Market Share Worldwide. http:\/\/gs.statcounter.com\/os-market-share\/desktop\/ worldwide. Accessed February 2, 2018."},{"key":"7061_CR13","unstructured":"OS Platform Statistics. https:\/\/www.w3schools.com\/browsers\/browsers_os.asp. Accessed February 2, 2018."},{"key":"7061_CR14","unstructured":"Market Share Statistics for Internet Technologies. Operating System Share by Version. https:\/\/netmarketshare.com\/ operating-system-market-share.aspx. Accessed February 2, 2018."},{"key":"7061_CR15","unstructured":"Security TechCenter. https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0262. Accessed February 2, 2018."},{"key":"7061_CR16","unstructured":"Security TechCenter. https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0263. Accessed February 2, 2018."},{"key":"7061_CR17","unstructured":"Neely, L., SANS Institute InfoSec Reading Room. Exploits at the Endpoint: SANS 2016 Threat Landscape Survey. https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/exploits-endpoint-2016-threat-landscape-survey-37157. Accessed February 2, 2018."},{"key":"7061_CR18","unstructured":"Thomas, H., International OpenOffice market shares. https:\/\/www.webmasterpro.de\/portal\/news\/2010\/ 02\/05\/international-openoffice-market-shares.html. Accessed February 2, 2018."},{"key":"7061_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0907-3","volume-title":"Learning to Classify Text Using Support Vector Machines: Methods, Theory and Algorithms","author":"T. Joachims","year":"2002","unstructured":"Joachims, T., Learning to Classify Text Using Support Vector Machines: Methods, Theory and Algorithms, Kluwer Academic Publ., 2002."},{"key":"7061_CR20","doi-asserted-by":"crossref","unstructured":"Wallach, H.M., Topic modeling: Beyond bag-of-words, Proc. of the 23rd Int. Conf. on Machine Learning. ACM, 2006, pp. 977\u2013984.","DOI":"10.1145\/1143844.1143967"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080278.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411618080278","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080278.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:32Z","timestamp":1773611912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411618080278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["7061"],"URL":"https:\/\/doi.org\/10.3103\/s0146411618080278","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"12 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}