{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:08:59Z","timestamp":1773655739247,"version":"3.50.1"},"reference-count":29,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080091","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"922-931","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures"],"prefix":"10.3103","volume":"53","author":[{"given":"N. A.","family":"Grusho","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7198_CR1","unstructured":"Kon\u2019kov, A.E., A method for optimizing the interaction of a multi-agent control system with a relational database, Materialy Mezhdunarodnogo molodezhnogo nauchnogo foruma Lomonosov-2016 Sektsiya Fizika (Proc. Int. Youth Scientific Forum Lomonosov-2016. Section Physics), 2016, vol. 1, pp. 135\u2013137."},{"key":"7198_CR2","unstructured":"Bol\u2019shakova, E.I. and Kudasov, N.D., An approach to the design of modular multi-agent systems, Lomonosovskie Chteniya: Nauchnaya konferentsiya (Lomonosov Readings: Scientific Conference), Moscow, 2016."},{"key":"7198_CR3","first-page":"58","volume":"12","author":"N.D. Kudasov","year":"2015","unstructured":"Kudasov, N.D., Modular multi-agent systems in functional programming languages, Sb. Statei Molodykh Uch. Fak. Vychisl. Mat. Kibern. Mosk. Gos. Univ., 2015, vol. 12, pp. 58\u201374.","journal-title":"Sb. Statei Molodykh Uch. Fak. Vychisl. Mat. Kibern. Mosk. Gos. Univ."},{"key":"7198_CR4","unstructured":"Shestakova, M.A. and Shestakov, E.I., Artificial intelligence and the problem of multi-agent system control, Neirokomp\u2019yut.: Razrab. Primen., 2016, no. 6, pp. 50\u201352."},{"key":"7198_CR5","unstructured":"Grusho, A.A. and Timonina, E.E., Security in a multi-agent system, Trudy mezhdunarodnoi konferentsii \u201cInformatsionnye tekhnologii v nauke, obrazovanii, telekommunikatsii, biznese (osennyaya sessiya)\u201d (Proc. Int. Conf. Information Technologies in Science, Education, Telecommunications, and Business (Autumn Session)), Zaporizhzhia, 2001, pp. 129\u2013130."},{"key":"7198_CR6","unstructured":"Kon\u2019kov, A.E., A method for optimizing the interaction of a multi-agent control system with a relational database, Materialy Mezhdunarodnogo molodezhnogo nauchnogo foruma Lomonosov-2016 Sektsiya Fizika (Proc. Int. Youth Scientific Forum Lomonosov-2016. Section Physics), 2016, vol. 1, pp. 135\u2013137."},{"key":"7198_CR7","doi-asserted-by":"crossref","unstructured":"Yaqin Hedin and Esmiralda Moradian, Security in multi-agent systems, Procedia Comput. Sci., 2015, vol. 60, pp.\u00a01604\u20131612.","DOI":"10.1016\/j.procs.2015.08.270"},{"key":"7198_CR8","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.procs.2015.05.071","volume":"52","author":"E. Shakshuki","year":"2015","unstructured":"Shakshuki, E. and Reid, M., Multi-agent system applications in healthcare: Current technology and future roadmap, Procedia Comput. Sci., 2015, vol. 52, pp. 252\u2013261.","journal-title":"Procedia Comput. Sci."},{"key":"7198_CR9","first-page":"151","volume":"16","author":"Chandramohan Dhasarathan","year":"2015","unstructured":"Chandramohan Dhasarathan, Sathian Dananjayan, Rajaguru Dayalan, Vengattaraman Thirumal, and Dhavachelvan Ponnurangam, A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment, Egypt. Inf. J., 2015, vol. 16, no. 1, pp. 151\u2013166.","journal-title":"Egypt. Inf. J."},{"key":"7198_CR10","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, S. and Bajo, J., Multi-agent system for management and monitoring of routes surveillance, International Workshop on Hybrid Artificial Intelligence Systems, 2008, pp. 38\u201345.","DOI":"10.1007\/978-3-540-87656-4_6"},{"key":"7198_CR11","doi-asserted-by":"crossref","unstructured":"Boudaoud, K. and Guessoum, Z., A multi-agents system for network security management, Sixth IFIP Conference on Intelligence in Networks (SmartNet\u20192000), Vienna, 2000.","DOI":"10.1007\/978-0-387-35522-1_23"},{"key":"7198_CR12","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1049\/iet-ifs.2010.0041","volume":"4","author":"H.F. Rashvand","year":"2010","unstructured":"Rashvand, H.F., Salah, K., Calero, J.M.A., and Harn, L., Distributed security for multi-agent systems\u2014review and applications, IET Inf. Secur., 2010, vol. 4, no. 4, pp. 188\u2013201.","journal-title":"IET Inf. Secur."},{"key":"7198_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04091-7_18","volume-title":"Multiagent systems for network intrusion detection: A review","author":"H. \u00c1lvaro","year":"2009","unstructured":"\u00c1lvaro, H. and Corchado, E., Multiagent systems for network intrusion detection: A review, Computational Intelligence in Security for Information Systems, 2009, pp. 143\u2013154. https:\/\/doi.org\/10.1007\/978-3-642-04091-7_18"},{"key":"7198_CR14","unstructured":"Nikishova, A.V., A multi-agent system for detecting attacks on the information system of the enterprise, Extended Abstract of Cand. Sci. (Eng.) Dissertation, Volgograd, 2013."},{"key":"7198_CR15","volume-title":"The architecture of the basic agents of a multi-agent information security system in computer networks","author":"V.I. Gorodetskii","year":"2000","unstructured":"Gorodetskii, V.I. and Kotenko. I.V., The architecture of the basic agents of a multi-agent information security system in computer networks, Izv. Yuzhn. Fed. Univ., 2000."},{"key":"7198_CR16","unstructured":"Kosenko, M.Yu., A multi-agent system for detecting and blocking botnets by identifying control traffic using data mining, Cand. Sci. (Eng.) Dissertation, Ufa State Aviation Technical University, 2017."},{"key":"7198_CR17","unstructured":"Mukhataev, Yu.B., Methods and means for predicting cerebrovascular accidents using bio-impedance analysis and multi-agent intelligent models, Extended Abstract of Cand. Sci. (Eng.) Dissertation, Kursk, 2017."},{"key":"7198_CR18","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s10458-011-9191-4","volume":"25","author":"L. Cao","year":"2012","unstructured":"Cao, L., Weiss, G., and Yu, P.S., A brief introduction to agent mining, Auton. Agents Multi-Agent Syst., 2012, vol.\u00a025, no. 3, pp. 419\u2013424.","journal-title":"Auton. Agents Multi-Agent Syst."},{"key":"7198_CR19","unstructured":"Kogalovskii, M.R., Metody integratsii dannykh v informatsionnykh sistemakh (Methods of Data Integration in Information Systems), Moscow: Inst. Probl. Rynka Ross. Akad. Nauk, 2010."},{"key":"7198_CR20","volume-title":"Data Integration","author":"M. Eltabakh","year":"2012","unstructured":"Eltabakh, M., Data Integration, Worcester, Massachusetts: Worcester Polytechnic Institute, 2012."},{"key":"7198_CR21","unstructured":"Tanca, L., An Introduction to Data Integration, Technologies for Information Systems. http:\/\/home.deib.polimi.it\/ schreibe\/TeSI\/Materials\/Tanca\/PDFTanca\/TSI_data-integration.pdf."},{"key":"7198_CR22","series-title":"Data integration\u2014problems, approaches, and perspectives","volume-title":"Conceptual Modelling in Information Systems Engineering","author":"P. Ziegler","year":"2007","unstructured":"Ziegler, P. and Dittrich, K.R., Data integration\u2014problems, approaches, and perspectives, in Conceptual Modelling in Information Systems Engineering, Krogstie, J., Opdahl, A.L., and Brinkkemper, S., Eds., Springer, 2007, pp. 39\u201358."},{"key":"7198_CR23","unstructured":"Lavrova, D.S. and Pechenkin, A.I., Detecting security incidents in the Internet of Things, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2015, no. 2, pp. 69\u201379."},{"key":"7198_CR24","doi-asserted-by":"crossref","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN\u201917 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295\u2013298.","DOI":"10.1145\/3136825.3136857"},{"key":"7198_CR25","doi-asserted-by":"publisher","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Kalinin, M.O., A new approach to security evaluation of operating systems, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2007, pp. 254\u2013259. https:\/\/doi.org\/10.1007\/978-3-540-73986-9_22","DOI":"10.1007\/978-3-540-73986-9_22"},{"key":"7198_CR26","doi-asserted-by":"publisher","first-page":"899","DOI":"10.3103\/S0146411617080119","volume":"51","author":"M.O. Kalinin","year":"2017","unstructured":"Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899\u2013901. https:\/\/doi.org\/10.3103\/S0146411617080119","journal-title":"Autom. Control Comput. Sci."},{"key":"7198_CR27","unstructured":"Zegzhda, D.P. and Kalinin, M.O., Logical security evaluation of real-world operating systems, International Conference on Enterprise Information Systems and Web Technologies 2007, 2007, pp. 234\u2013241. https:\/\/www.scopus.com\/ inward\/record.uri?eid=2-s2.0-84878134140&partnerID=40&md5=6e5f7bb7a582d741d64700e418cb9db9."},{"key":"7198_CR28","doi-asserted-by":"publisher","first-page":"984","DOI":"10.3103\/S0146411618080291","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984\u2013992.","journal-title":"Autom. Control Comput. Sci."},{"key":"7198_CR29","first-page":"33","volume":"10","author":"A.A. Grusho","year":"2009","unstructured":"Grusho, A.A., Grusho, N.A., and Timonina, E.E., Methods of protecting information from attacks using hidden channels and hostile software and hardware agents in distributed systems, Vestn. Ross. Gos. Gumanit. Univ., Ser.: Dok. Arkh., Inf.,Zashch. Inf. Inf. Bezop., 2009, vol. 10, pp. 33\u201345.","journal-title":"Zashch. Inf. Inf. Bezop."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080091.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080091","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080091.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:55Z","timestamp":1773611815000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7198"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080091","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"11 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The results of the work were obtained using the computing resources of the supercomputer center of the St. Petersburg Polytechnic University Peter the Great SCC (\n                      \n                      ).","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"ACKNOWLEDGMENTS"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}