{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:53Z","timestamp":1773655793139,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080327","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"937-947","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"E. A.","family":"Zaitseva","sequence":"first","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Poltavtseva","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7200_CR1","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931\u2013935.","journal-title":"Autom. Control Comput. Sci."},{"key":"7200_CR2","doi-asserted-by":"publisher","first-page":"959","DOI":"10.3103\/S0146411618080217","volume":"52","author":"V.V. Platonov","year":"2018","unstructured":"Platonov, V.V. and Semenov, P.O., Detection of abnormal traffic in dynamic computer networks with mobile consumer devices, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 959\u2013964.","journal-title":"Autom. Control Comput. Sci."},{"key":"7200_CR3","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917.","journal-title":"Autom. Control Comput. Sci."},{"key":"7200_CR4","doi-asserted-by":"crossref","unstructured":"Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proceedings of the 8th International Conference on Security of Information and Networks, ACM, 2015, pp. 142\u2013149.","DOI":"10.1145\/2799979.2799995"},{"key":"7200_CR5","unstructured":"Moskvin, D.A. and Myasnikov, A.V., Optimization of the penetration testing process using machine learning technologies, Sb. Materialov 27-i nauchno-tekhnicheskoi konferentsii \u201cMetody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii\u201d (Proc. 27th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), St. Petersburg, 2018, pp. 44\u201345."},{"key":"7200_CR6","unstructured":"Borges, J., Martins, J., Andrade, J., dos Santos, H., and Militar-Cinamil, A., Design of a case-based reasoner for information security in military organizations, ECCWS2015-Proceedings of the 14th European Conference on Cyber Warfare and Security 2015, 2015, p. 26."},{"key":"7200_CR7","doi-asserted-by":"crossref","unstructured":"Fei Jiang, Tianlong Gu, Liang Chang, and Zhoubo Xu, Case retrieval for network security emergency response based on description logic, 8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China, 2014, pp. 284\u2013293.","DOI":"10.1007\/978-3-662-44980-6_32"},{"key":"7200_CR8","first-page":"744","volume":"12","author":"E. Chun","year":"2017","unstructured":"Chun, E., Han, J., and Han, H., Risk identification using case based reasoning in software project, J. Software, 2017, vol. 12, no. 9, pp. 744\u2013751.","journal-title":"J. Software"},{"key":"7200_CR9","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/978-3-540-73499-4_33","volume":"4571","author":"A. Micarelli","year":"2007","unstructured":"Micarelli, A. and Sansonetti, G., A case-based approach to anomaly intrusion detection, Lect. Notes Comput. Sci., 2007, vol. 4571, pp. 434-448.","journal-title":"Lect. Notes Comput. Sci."},{"key":"7200_CR10","unstructured":"Zakaria, W.Z.A. and Mat Kiah, M.L., Implementing a CBR recommender for dynamic honeypot using jCOLIBRI, 3rd International Conference on Computer Science and Computational Mathematics, Langkawi, Kedah, Malaysia, 2014."},{"key":"7200_CR11","volume-title":"Security control in information systems using the analysis of the graph of events obtained as a result of monitoring","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Security control in information systems using the analysis of the graph of events obtained as a result of monitoring, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2017, pp. 31\u201338."},{"key":"7200_CR12","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.3103\/S0146411618080059","volume":"52","author":"A.G. Busygin","year":"2018","unstructured":"Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080\u20131083.","journal-title":"Autom. Control Comput. Sci."},{"key":"7200_CR13","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the siem system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673\u2013681.","journal-title":"Autom. Control Comput. Sci."},{"key":"7200_CR14","unstructured":"Aleksandrova, E.B. and Pendrikova, O.N., Application of isogeny graphs to check the supersingularity of elliptic curves, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 3, pp. 63\u201369."},{"key":"7200_CR15","doi-asserted-by":"publisher","first-page":"918","DOI":"10.3103\/S0146411618080278","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 918\u2013930.","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080327.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080327","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080327.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:04Z","timestamp":1773612004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7200"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080327","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"18 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}