{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:14Z","timestamp":1773615614283,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621070075","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T09:15:43Z","timestamp":1643706943000},"page":"623-635","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Markov Model of Nonmutually Exclusive Cyberthreats and Its Applications for Selecting an Optimal Set of Information Security Tools"],"prefix":"10.3103","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2770-1144","authenticated-orcid":false,"given":"A. A.","family":"Kassenov","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8725-9183","authenticated-orcid":false,"given":"A. A.","family":"Magazev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6875-7216","authenticated-orcid":false,"given":"V. F.","family":"Tsyrulnik","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,2,1]]},"reference":[{"key":"7392_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TR.2004.823851","volume":"53","author":"N. Ye","year":"2004","unstructured":"Ye, N., Zhang, Y., and Borror, C.M., Robustness of the Markov-chain model for cyber-attack detection, IEEE Trans. Reliab., 2004, vol. 53, no. 1, pp. 116\u2013123.","journal-title":"IEEE Trans. Reliab."},{"key":"7392_CR2","doi-asserted-by":"crossref","unstructured":"Jha, S., Tan, K., and Maxion, R., Markov chains, classifiers, and intrusion detection., Proc. IEEE Computer Security Foundations Workshops, 2001, vol. 1, pp. 206\u2013219.","DOI":"10.1109\/CSFW.2001.930147"},{"key":"7392_CR3","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/sam.11377","volume":"11","author":"A. Ahmadian Ramaki","year":"2018","unstructured":"Ahmadian Ramaki, A., Rasoolzadegan, A., and Javan Jafari, A., A systematic review on intrusion detection based on the Hidden Markov Model, Stat. \n               Anal. Data Mining: ASA Data Sci. J., 2018, vol. 11, no. 3, pp. 111\u2013134.","journal-title":"Anal. Data Mining: ASA Data Sci. J."},{"key":"7392_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P. Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci\u00e1-Fern\u00e1ndez, G., and V\u00e1zquez, E., Anomaly-based network intrusion detection: Techniques, systems and challenges, Comput. Secur., 2009, vol. 28, nos. 1\u20132, pp. 18\u201328.","journal-title":"Comput. Secur."},{"key":"7392_CR5","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/S0375-9601(02)00152-4","volume":"297","author":"L. Billings","year":"2002","unstructured":"Billings, L., Spears, W., and Schwartz, I., A unified prediction of computer virus spread in connected networks, Phys. Lett. A, 2002, vol. 297, nos. 3\u20134, pp. 261\u2013266.","journal-title":"Phys. Lett. A"},{"key":"7392_CR6","first-page":"196","volume":"5","author":"A. Boyko","year":"2015","unstructured":"Boyko, A., A method for analytical modeling of the process of spreading viruses in computer networks of various structures, Tr. SPIIRAN, 2015, vol. 5, no. 42, pp. 196\u2013211.","journal-title":"Tr. SPIIRAN"},{"key":"7392_CR7","unstructured":"Dalinger, Y., Babanin, D., and Burkov, S.M., Mathematical models of the spread of viruses in computer networks of various structures, Inf. Sist. Upr., 2012, no. 4, pp. 25\u201333."},{"key":"7392_CR8","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1002\/sec.1186","volume":"8","author":"A. Del Rey","year":"2015","unstructured":"Del Rey, A., Mathematical modeling of the propagation of malware: A review, Secur. Commun. Networks, 2015, vol. 8, no. 15, pp. 2561\u20132579.","journal-title":"Secur. Commun. Networks"},{"key":"7392_CR9","first-page":"664","volume":"20","author":"M. Yang","year":"2018","unstructured":"Yang, M., Jiang, R., Gao, T., Xie, W., and Wang, J., Research on cloud computing security risk assessment based on information entropy and Markov chain, Int. J. Network Secur., 2018, vol. 20, no. 4, pp. 664\u2013673.","journal-title":"Int. J. Network Secur."},{"key":"7392_CR10","doi-asserted-by":"crossref","unstructured":"Xiaolin, C., Xiaobin, T., Yong, Z., and Hongsheng, X., A Markov game theory-based risk assessment model for network information system, International Conference on Computer Science and Software Engineering, IEEE, 2008, vol. 3, pp. 1057\u20131061.","DOI":"10.1109\/CSSE.2008.949"},{"key":"7392_CR11","doi-asserted-by":"crossref","unstructured":"Orojloo, H. and Azgomi, M., A method for modeling and evaluation of the security of cyber-physical systems, 11th International ISC Conference on Information Security and Cryptology, IEEE, 2014, pp. 131\u2013136.","DOI":"10.1109\/ISCISC.2014.6994036"},{"key":"7392_CR12","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1016\/j.comnet.2013.03.011","volume":"57","author":"J. Almasizadeh","year":"2013","unstructured":"Almasizadeh, J. and Azgomi, M., A stochastic model of attack process for the evaluation of security metrics, Comput. Networks, 2013, vol. 57, no. 10, pp. 2159\u20132180.","journal-title":"Comput. Networks"},{"key":"7392_CR13","first-page":"957","volume":"58","author":"K. Shcheglov","year":"2015","unstructured":"Shcheglov, K. and Shcheglov, A., Markov models of threats to the security of information systems, Izv. Vyssh. Uchebn. Zaved., \n               Priborostr., 2015, vol. 58, no. 12, pp. 957\u2013965.","journal-title":"Priborostr."},{"key":"7392_CR14","first-page":"71","volume":"85","author":"A. Rosenko","year":"2008","unstructured":"Rosenko, A., Mathematical modeling of the impact of internal threats on security of confidential information circulating in an automated information system, Izv. Yuzhn. Fed. Univ., \n               Tekh. Nauki, 2008, vol. 85, no. 8, pp.\u00a071\u201381.","journal-title":"Tekh. Nauki"},{"key":"7392_CR15","doi-asserted-by":"publisher","first-page":"615","DOI":"10.3103\/S0146411618070180","volume":"52","author":"A. Magazev","year":"2018","unstructured":"Magazev, A. and Tsyrulnik, V., Investigation of a Markov model for computer system security threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 7, pp. 615\u2013624.","journal-title":"Autom. Control Comput. Sci."},{"key":"7392_CR16","first-page":"012160","volume":"1096","author":"A. Magazev","year":"2018","unstructured":"Magazev, A. and Tsyrulnik, V., Optimizing the selection of information security remedies in terms of a Markov security model, J. Phys.: Conf. Ser., 2018, vol. 1096, 012160.","journal-title":"J. Phys.: Conf. Ser."},{"key":"7392_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1108\/09685221111143042","volume":"19","author":"D. Shirtz","year":"2011","unstructured":"Shirtz, D. and Elovici, Y., Optimizing investment decisions in selecting information security remedies, Inf. Manage. Comput. Secur., 2011, vol. 19, no. 2, pp. 95\u2013112.","journal-title":"Inf. Manage. Comput. Secur."},{"key":"7392_CR18","volume-title":"Integrals and Series: Elementary Functions","author":"A.P. Prudnikov","year":"1986","unstructured":"Prudnikov, A.P., Brychkov, Yu.A., and Marichev, O.I., Integrals and Series: Elementary Functions, New York: Gordon & Breach Sci. Publ., 1986, vol. 1."},{"key":"7392_CR19","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1968","unstructured":"Feller, W., An Introduction to Probability Theory and Its Applications, John Wiley & Sons Inc., 1968, vol. 1."},{"key":"7392_CR20","unstructured":"Ovchinnikov, A.I., A mathematical model for the optimal choice of means of protection against security threats in computing networks at enterprises, Vestn. Mosk. Gos. Tekh. Univ. im. N.E. Baumana, Ser. Priborostr., 2007, no. 3, pp. 115\u2013121."},{"key":"7392_CR21","unstructured":"Kovalev, M., Diskretnaya optimizatsiya (tselochislennoe programmirovanie) (Discrete Optimization (Integer Programming)), Moscow: Editorial URSS, 2003, 2nd ed."},{"key":"7392_CR22","unstructured":"Beshelev, S.D. and Gurvich, F., Matematiko-statisticheskie metody ekspertnykh otsenok (Mathematical-Statistical Methods of Expert Estimates), Moscow: Statistika, 1980."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621070075.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621070075","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621070075.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:17Z","timestamp":1773612137000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621070075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":22,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7392"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621070075","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"27 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}