{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:59:02Z","timestamp":1773655142301,"version":"3.50.1"},"reference-count":33,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080362","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"864-870","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Approach to the Evaluation of the Efficiency of Information Security in Control Systems"],"prefix":"10.3103","volume":"54","author":[{"given":"P. D.","family":"Zegzhda","sequence":"first","affiliation":[]},{"given":"V. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"P. V.","family":"Sem\u2019yanov","sequence":"additional","affiliation":[]},{"given":"A. F.","family":"Suprun","sequence":"additional","affiliation":[]},{"given":"E. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"T. N.","family":"Saurenko","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Los\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7305_CR1","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3103\/S0146411617080260","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P. and Pavlenko, E.Y., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805\u2013816.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR2","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.3103\/S0146411618080333","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150\u20131159. https:\/\/doi.org\/10.3103\/S0146411618080333","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR3","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-14706-7_27","volume":"6258","author":"D.P. Zegzhda","year":"2010","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337\u2013344.","journal-title":"Lect. Notes Comput. Sci."},{"key":"7305_CR4","unstructured":"Zegzhda, D.P. and Kalinin, M.O., Logical security evaluation of real-world operating systems, International Conference on Enterprise Information Systems and Web Technologies, EISWT 2007, 2007, pp. 234\u2013241."},{"key":"7305_CR5","first-page":"254","volume":"1","author":"P.D. Zegzhda","year":"2007","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Kalinin, M.O., A new approach to security evaluation of operating systems, Commun. Comput. Inf. Sci., 2007, vol. 1, pp. 254\u2013259.","journal-title":"Commun. Comput. Inf. Sci."},{"key":"7305_CR6","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR7","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S014641161508026X","volume":"49","author":"M.O. Kalinin","year":"2015","unstructured":"Kalinin, M.O. and Pavlenko, E.Y., Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 673\u2013678.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR8","doi-asserted-by":"crossref","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81\u201387.","DOI":"10.1145\/2947626.2947639"},{"key":"7305_CR9","doi-asserted-by":"crossref","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Nikolskiy, A.V., Using graph theory for cloud system security modeling, International\u00a0Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Berlin, 2012, pp. 309\u2013318.","DOI":"10.1007\/978-3-642-33704-8_26"},{"key":"7305_CR10","first-page":"60","volume":"2603","author":"E. Pavlenko","year":"2019","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60\u201364.","journal-title":"CEUR Workshop Proc."},{"key":"7305_CR11","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A., Zegzhda, D.P., and Pavlenko, E.Y., High-performance NIDS architecture for enterprise networking, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812808","DOI":"10.1109\/BlackSeaCom.2019.8812808"},{"key":"7305_CR12","first-page":"34","volume":"2603","author":"D. Lavrova","year":"2019","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34\u201339.","journal-title":"CEUR Workshop Proc."},{"key":"7305_CR13","doi-asserted-by":"crossref","unstructured":"Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Zotova, E.A., Models of forecasting destructive influence risks for information processes in management systems, Inf.-Upr. Sist., 2019, no. 5, pp. 18\u201323.","DOI":"10.31799\/1684-8853-2019-5-18-23"},{"key":"7305_CR14","unstructured":"Saurenko, T.N., et al., Forecasting information security incidents, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2019, no.\u00a03, pp. 24\u201328."},{"key":"7305_CR15","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/S0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 824\u2013828.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR16","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/S0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390814","volume-title":"Sustainability of cyber-physical systems in the context of targeted destructive influences","author":"E. Pavlenko","year":"2018","unstructured":"Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830\u2013834."},{"key":"7305_CR18","volume-title":"Characteristic Functions","author":"E. Lukacs","year":"1960","unstructured":"Lukacs, E., Characteristic Functions, Cover Hafner Publ. Co., 1960."},{"key":"7305_CR19","unstructured":"Anisimov, V.G., Anisimov, E.G., Martyshchenko, L.A., and Shatokhin, D.V., Metody operativnogo statisticheskogo analiza rezul\u2019tatov vyborochnogo kontrolya kachestva promyshlennoi produktsii (Methods of Operational Statistical Analysis of Results of Sampling Quality Control of Industrial Products), St. Petersburg: Tula, 2001."},{"key":"7305_CR20","unstructured":"Anisimov, V.G., et al., Strategicheskoe upravlenie innovatsionnoi deyatel\u2019nost\u2019yu: Analiz, planirovanie, modelirovanie, prinyatiya reshenii, organizatsiya, otsenka (Strategic Management of Innovative Activity: Analysis, Planning, Modeling, Decision Making, Organization, and Assessment), St. Petersburg, 2017."},{"key":"7305_CR21","volume-title":"Matematicheskie metody i instrumental\u2019nye sredstva otsenivaniya effektivnosti investitsii v innovatsionnye proekty","author":"I.V. Il'in","year":"2018","unstructured":"Il'in, I.V., et al., Matematicheskie metody i instrumental\u2019nye sredstva otsenivaniya effektivnosti investitsii v innovatsionnye proekty (Mathematical Methods and Tools for Assessing the Effectiveness of Investments in Innovative Projects), St. Petersburg, 2018."},{"key":"7305_CR22","unstructured":"Anisimov, V.G., Ekonomicheskii i tamozhennyi risk-menedzhment (Economic and Customs Risk Management), Moscow: Ross. Tamozhen. Akad., 2015."},{"key":"7305_CR23","first-page":"620","volume":"106","author":"E.T. Jaynes","year":"1957","unstructured":"Jaynes, E.T., Information theory and statistical mechanics, Phys. Rev., \n               Ser. II, 1957, vol. 106, no. 4, pp. 620\u2013630.","journal-title":"Ser. II"},{"key":"7305_CR24","doi-asserted-by":"publisher","unstructured":"Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Sonkin, M.A., The model and the planning method of volume and variety assessment of innovative products in an industrial enterprise, J. Phys.: Conf. Ser., 2017, vol.\u00a0803, no. 1. https:\/\/doi.org\/10.1088\/1742-6596\/803\/1\/012006","DOI":"10.1088\/1742-6596\/803\/1\/012006"},{"key":"7305_CR25","doi-asserted-by":"crossref","unstructured":"Saurenko, T., Anisimov, E., Anisimov, V., and Bagaeva, I., Conceptual provisions for assessing the effectiveness of energy saving, E3S Web of Conferences, 2018.","DOI":"10.1051\/e3sconf\/201911002066"},{"key":"7305_CR26","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR27","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3103\/S0146411616080289","volume":"50","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717\u2013721.","journal-title":"Autom. Control Comput. Sci."},{"key":"7305_CR28","volume-title":"Nonlinear Preference and Utility Theory","author":"P.C. Fishburn","year":"1988","unstructured":"Fishburn, P.C., Nonlinear Preference and Utility Theory, Baltimore: Johns Hopkins Univ. Press, 1988."},{"key":"7305_CR29","doi-asserted-by":"crossref","unstructured":"Anisimov, E.G., Anisimov, V.G., and Sonkin, M.A., Mathematical simulation of adaptive allocation of discrete resources, Proceedings of the 2016 Conference on Information Technologies in Science, Management, Social Sphere and Medicine (ITSMSSM 2016), Tomsk, 2016, pp. 282\u2013285.","DOI":"10.2991\/itsmssm-16.2016.57"},{"key":"7305_CR30","doi-asserted-by":"crossref","unstructured":"Saurenko, T., Anisimov, E., Anisimov, V., and Levina, A., Comparing investment projects of innovative developing strategies of municipalities, based on a set of indicators, MATEC Web of Conferences: International Science Conference SPbWOSCE-2017 \u201cBusiness Technologies for Sustainable Urban Development,\u201d \n               2017, 2018, p. 01038.","DOI":"10.1051\/matecconf\/201817001038"},{"key":"7305_CR31","unstructured":"Anisimov, V.G., Anisimov, E.G., Novikov, V.E., and Ostanin, V.A., Modeling of optimization problems of decision support in innovative management, Vestn. Ross. Tamozhen. Akad., 2016, no. 1, pp. 90\u201398."},{"key":"7305_CR32","unstructured":"Anisimov, V.G. and Anisimov, E.G., An optimization model for distribution of renewable resources in the management of economic systems, Vestn. Ross. Tamozhen. Akad., 2007, no. 1, pp. 49\u201354."},{"key":"7305_CR33","unstructured":"Gradshtein, I.S. and Ryzhik, I.N., Tablitsy integralov, summ, ryadov i proizvedenii (Tables of Integrals, Sums, Series, and Products), Moscow: Fimatgiz, 1962."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080362.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080362","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080362.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:43Z","timestamp":1773612283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7305"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080362","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"23 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}