{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:00Z","timestamp":1773655740801,"version":"3.50.1"},"reference-count":9,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080216","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"949-955","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Constructing the Model of an Information System for the Automatization of Penetration Testing"],"prefix":"10.3103","volume":"55","author":[{"given":"A. V.","family":"Myasnikov","sequence":"first","affiliation":[]},{"given":"A. S.","family":"Konoplev","sequence":"additional","affiliation":[]},{"given":"A. F.","family":"Suprun","sequence":"additional","affiliation":[]},{"given":"V. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"V. V.","family":"Kasatkin","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Los\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7421_CR1","doi-asserted-by":"publisher","unstructured":"Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proc. 8th Int. Conf. on Security of Information and Networks, Sochi, Russia, 2015, New York: Association for Computing Machinery, 2015, pp. 519\u2013525. \u00a0https:\/\/doi.org\/10.1145\/2799979.2799995","DOI":"10.1145\/2799979.2799995"},{"key":"7421_CR2","volume-title":"Reinforcement Learning: An Introduction","author":"R.S. Sutton","year":"1998","unstructured":"Sutton, R.S. and Barto, A.G., Reinforcement Learning: An Introduction, Cambridge, Mass.: MIT Press, 1998, 2nd ed."},{"key":"7421_CR3","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917. https:\/\/doi.org\/10.3103\/S0146411618080151","journal-title":"Autom. Control Comput. Sci."},{"key":"7421_CR4","doi-asserted-by":"publisher","unstructured":"Pavlenko, E. and Zegzhda, D., Homeostatic approach to assessing digital manufacturing security, SHS Web Conf., 2018, vol. 44, p. 00066. \u00a0https:\/\/doi.org\/10.1051\/shsconf\/20184400066","DOI":"10.1051\/shsconf\/20184400066"},{"key":"7421_CR5","doi-asserted-by":"publisher","first-page":"972","DOI":"10.3103\/S0146411619080339","volume":"53","author":"D.P. Zegzhda","year":"2019","unstructured":"Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972\u2013979.\u00a0https:\/\/doi.org\/10.3103\/S0146411619080339","journal-title":"Autom. Control Comput. Sci."},{"key":"7421_CR6","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 295\u2013298. https:\/\/doi.org\/10.1145\/3136825.3136857","DOI":"10.1145\/3136825.3136857"},{"key":"7421_CR7","doi-asserted-by":"publisher","unstructured":"Ghanem, M.C. and Chen, T.M., Reinforcement learning for intelligent penetration testing, Second World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2018, IEEE, 2018, pp. 185\u2013192. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2018.8611595","DOI":"10.1109\/WorldS4.2018.8611595"},{"key":"7421_CR8","doi-asserted-by":"publisher","unstructured":"Greenwald, L. and Shanley, R., Automated planning for remote penetration testing, MILCOM 2009\u20142009 IEEE Military Communications Conf., Boston, 2009, IEEE, 2009, pp.\u00a01\u20137. \u00a0https:\/\/doi.org\/10.1109\/MILCOM.2009.5379852","DOI":"10.1109\/MILCOM.2009.5379852"},{"key":"7421_CR9","unstructured":"Sarraute, C., Buffet, O., and Hoffmann, J., Penetration Testing = POMDP Solving?, Proc. 3rd Workshop on Intelligent Security (SecArt\u201911), 2011. arXiv:1306.4714 [cs.AI]"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080216.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080216","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080216.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:46Z","timestamp":1773612346000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080216"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":9,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7421"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080216","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"3 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}