{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:44Z","timestamp":1773655784176,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080192","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"944-948","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Multilevel Model of Computer Attack Based on Attributive Metagraphs"],"prefix":"10.3103","volume":"54","author":[{"given":"I. T.","family":"Latypov","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Eremeev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7316_CR1","unstructured":"The Decree of the Government of the Russian Federation of May 11, 2017 No. 555 \u201cOn Amending the Requirements for the Creation, Development, Commissioning, Operation, and Decommissioning of State Information Systems and Further Storage of Information Contained in Their Databases.\u201d https:\/\/www.rulaws.ru\/goverment\/Postanovlenie-Pravitelstva-RF-ot-11.05.2017-N-555\/."},{"key":"7316_CR2","unstructured":"Metodika opredeleniya ugroz bezopasnosti v informatsionnykh sistemakh (Methodology for Determining Security Threats in Information Systems), Moscow: FSTEK, 2015."},{"key":"7316_CR3","unstructured":"Novokhrestov, A.K. and Konev, A.A., Assessment of the security quality of computer networks, Din. Sist. Mekh. Mash., 2014, no. 4, pp. 85\u201387."},{"key":"7316_CR4","unstructured":"Gorodetskii, V.I. and Karasev, O.V., Applied multi-agent systems of group control, Iskustv. Intell. Prinyatie Reshenii, 2009, no. 2, pp. 3\u201324."},{"key":"7316_CR5","doi-asserted-by":"publisher","first-page":"809","DOI":"10.3103\/S0146411616080241","volume":"50","author":"D.P. Zegzhda","year":"2016","unstructured":"Zegzhda, D.P., Stepanova, T.V., and Suprun, A.F., Multiagent system controllability evaluation using the multilevel structure of the graph of agent, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 809\u2013812.","journal-title":"Autom. Control Comput. Sci."},{"key":"7316_CR6","doi-asserted-by":"crossref","unstructured":"Kotenko, I.V. and Saenko, I.B., Architecture of the system of intelligent information protection services in critical infrastructures, Tr. SPIIRAN, 2013, no. 24, pp. 21\u201340.","DOI":"10.15622\/sp.24.2"},{"key":"7316_CR7","doi-asserted-by":"publisher","first-page":"906","DOI":"10.3103\/S014641161808014X","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906\u2013911.","journal-title":"Autom. Control Comput. Sci."},{"key":"7316_CR8","unstructured":"Gorbachev, I.E., Sukhov, A.M., Eremeev, M.A., and Smirnov, S.I., Methodology for implementing a systematic approach in creating the image of the information security system of critical information infrastructure, taking into account economic feasibility, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 2, pp. 93\u2013111."},{"key":"7316_CR9","first-page":"107","volume":"28","author":"A.A. Konev","year":"2013","unstructured":"Konev, A.A. and Davydova, E.M., An approach to the description of the structure of the information security system, Dokl. TUSUR, 2013, vol. 28, no. 2, pp. 107\u2013111.","journal-title":"Dokl. TUSUR"},{"key":"7316_CR10","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, ACM International Conference Proceeding Series, 2017, pp. 295\u2013298. https:\/\/doi.org\/10.1145\/3136825.3136857","DOI":"10.1145\/3136825.3136857"},{"key":"7316_CR11","doi-asserted-by":"publisher","first-page":"665","DOI":"10.3103\/S0146411615080180","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665\u2013672.","journal-title":"Autom. Control Comput. Sci."},{"key":"7316_CR12","doi-asserted-by":"crossref","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258.","DOI":"10.1007\/978-3-642-14706-7_27"},{"key":"7316_CR13","first-page":"60","volume":"2603","author":"E. Pavlenko","year":"2019","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60\u201364.","journal-title":"CEUR Workshop Proc."},{"key":"7316_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390814","volume-title":"Sustainability of cyber-physical systems in the context of targeted destructive influences","author":"E. Pavlenko","year":"2018","unstructured":"Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830\u2013834."},{"key":"7316_CR15","first-page":"34","volume":"25","author":"A.A. Konev","year":"2012","unstructured":"Konev, A.A., An approach to building a model of threats to protected information, Dokl. TUSUR, 2012, vol. 25, no. 1, pp. 34\u201339.","journal-title":"Dokl. TUSUR"},{"key":"7316_CR16","unstructured":"Mallon, S., Strategic Cybersecurity Leader & Executive Consultant, at Black Hat 2016: Extended Cyber Kill Chain. https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf. Accessed May 19, 2020."},{"key":"7316_CR17","volume-title":"Theory of Hierarchical, Multilevel, Systems","author":"M. Mesarovic","year":"2000","unstructured":"Mesarovic, M., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 2000."},{"key":"7316_CR18","unstructured":"Astanin, S.V., Dragnysh, N.V., and Zhukovskaya, N.K., Nested metagraphs as models of complex objects. http:\/\/ivdon.ru\/magazine\/archive\/n4p2y2012\/1434. Accessed May 19, 2020."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080192.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080192","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080192.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:38Z","timestamp":1773612158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080192"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7316"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080192","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"19 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}