{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:41Z","timestamp":1773615761208,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080125","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"970-977","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Methodology of Mediametric Information Analysis with the Use of Machine Learning Algorithms"],"prefix":"10.3103","volume":"55","author":[{"given":"I. E.","family":"Gorbachev","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Kriulin","sequence":"additional","affiliation":[]},{"given":"I. T.","family":"Latypov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7424_CR1","unstructured":"RF Presidential Decree no. 646 of December 5, 2016 On Enactment of Doctrine of Information Security of the Russian Federation, Kremlin Official Site. http:\/\/www.kremlin.ru\/acts\/bank\/41460."},{"key":"7424_CR2","unstructured":"Nikolaichuk, I.A., Politicheskaya mediametriya. Zarubezhnye SMI i bezopasnost\u2019 Rossii (Political Mediametry: Foreign Mass Media and Security of Russia), Moscow: RISI, 2015."},{"key":"7424_CR3","unstructured":"Poluekhtova, I.A., The studies of audience and media consumption in the digital environment: Methodological and practical problems, Mediaskop, 2016, no. 4, p. 6."},{"key":"7424_CR4","unstructured":"Vartanova, E.L., Mediaekonomika zarubezhnykh stran. Uchebnoe posobie (Economics of Media in Foreign Countries: Handbook), Moscow: Aspekt Press, 2003."},{"key":"7424_CR5","unstructured":"Bulanin, D., Novye slova i znacheniya (New Words and Meanings), vol. 3 of Slovar\u2019-spravochnik po materialam pressy i literatury 90-kh godov XX veka (Dictionary and Reference Book on Materials of Mass Media and Literature of 1990th), St. Petersburg: Parkomat-Ya, 2014."},{"key":"7424_CR6","series-title":"Using graph theory for cloud system security modeling","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_26","volume-title":"Computer Network Security. MMM-ACNS 2012","author":"P.D. Zegzhda","year":"2012","unstructured":"Zegzhda, P.D., Zegzhda, D.P., Nikolskiy, A.V., Using graph theory for cloud system security modeling, in Computer Network Security. MMM-ACNS 2012, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 7531, Berlin: Springer, 2012, pp. 309\u2013318. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-33704-8_26"},{"key":"7424_CR7","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, p. 7. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"key":"7424_CR8","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/S0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Yu., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080296","journal-title":"Autom. Control Comput. Sci."},{"key":"7424_CR9","doi-asserted-by":"publisher","unstructured":"Izergin, D.A., Eremeev, M.A., Magomedov, S.G., and Smirnov, S.I., Information security evaluation for Android mobile operating system, Russ. Technol. J., 2019, vol. 7, no. 6, pp. 44\u201355. https:\/\/doi.org\/10.32362\/2500-316X-2019-7-6-44-55","DOI":"10.32362\/2500-316X-2019-7-6-44-55"},{"key":"7424_CR10","volume-title":"Data Science from Scratch: First Principles with Python","author":"J. Grus","year":"2015","unstructured":"Grus, J., Data Science from Scratch: First Principles with Python, O\u2019Reilly Media, 2015."},{"key":"7424_CR11","unstructured":"Data sample on corona virus pandemic in the world. www.kaggle.com\/imdevskp\/corona-virus-report. Cited April 5, 2020."},{"key":"7424_CR12","doi-asserted-by":"crossref","unstructured":"Data sample of emails of H. Clinton. https:\/\/github.com\/benhamner\/hillary-clinton-emails. Cited April 5, 2020.","DOI":"10.23860\/dignity.2020.05.02.17"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080125.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080125","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080125.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:14Z","timestamp":1773612254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7424"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080125","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"20 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}