{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:14Z","timestamp":1773655634299,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080277","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"903-907","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Information Security Incident Forecasting"],"prefix":"10.3103","volume":"55","author":[{"given":"T. N.","family":"Saurenko","sequence":"first","affiliation":[]},{"given":"V. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"E. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"V. V.","family":"Kasatkin","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Los\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7415_CR1","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/S0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol.\u00a051, no. 8, pp. 824\u2013828. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080053","journal-title":"Autom. Control Comput. Sci."},{"key":"7415_CR2","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3103\/S0146411616080289","volume":"50","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Zegzhda, D.P., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717\u2013721. \u00a0https:\/\/doi.org\/10.3103\/S0146411616080289","journal-title":"Autom. Control Comput. Sci."},{"key":"7415_CR3","doi-asserted-by":"publisher","first-page":"984","DOI":"10.3103\/S0146411618080291","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984\u2013992. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080291","journal-title":"Autom. Control Comput. Sci."},{"key":"7415_CR4","first-page":"196","volume":"22","author":"D. Zegzhda","year":"2019","unstructured":"Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2019, vol. 22, no.\u00a02, pp. 196\u2013204.","journal-title":"Nonlinear Phenom. Complex Syst. (Minsk, Belarus)"},{"key":"7415_CR5","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080144","journal-title":"Autom. Control Comput. Sci."},{"key":"7415_CR6","doi-asserted-by":"publisher","first-page":"012006","DOI":"10.1088\/1742-6596\/803\/1\/012006","volume":"803","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Sonkin, M.A., The model and the planning method of volume and variety assessment of innovative products in an industrial enterprise, J. Phys.: Conf. Ser., 2017, vol.\u00a0803, p. 012006. \u00a0https:\/\/doi.org\/10.1088\/1742-6596\/803\/1\/012006","journal-title":"J. Phys.: Conf. Ser."},{"key":"7415_CR7","doi-asserted-by":"publisher","unstructured":"Saurenko, T., Anisimov, E., Anisimov, V., and Levina, A., Comparing investment projects of innovative developing strategies of municipalities, based on a set of indicators, MATEC Web Conf., 2018, vol. 170, p. 01038. \u00a0https:\/\/doi.org\/10.1051\/matecconf\/201817001038","DOI":"10.1051\/matecconf\/201817001038"},{"key":"7415_CR8","doi-asserted-by":"publisher","unstructured":"Anisimov, V., Chernysh, A., and Anisimov, E., Model and algorithm for substantiating solutions for organization of high-rise construction project, E3S Web Conf., 2018, vol. 33, p. 03003. \u00a0https:\/\/doi.org\/10.1051\/e3sconf\/20183303003","DOI":"10.1051\/e3sconf\/20183303003"},{"key":"7415_CR9","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1103\/PhysRev.106.620","volume":"106","author":"E.T. Jaynes","year":"1957","unstructured":"Jaynes, E.T., Information theory and statistical mechanics, Phys. Rev., 1957, vol. 106, pp.\u00a0620\u2013630. \u00a0https:\/\/doi.org\/10.1103\/PhysRev.106.620","journal-title":"Phys. Rev."},{"key":"7415_CR10","first-page":"130","volume":"5","author":"A.O. Alekseyev","year":"1988","unstructured":"Alekseyev, A.O., Alekseyev, O.G., Anisimov, V.G., Anisimov, E.G., and Yachkula, N.I., Application of Markov chains in estimating the computational complexity of the simplex method, Sov. J. Comput. Syst. Sci., 1988, vol. 5, pp. 130\u2013134.","journal-title":"Sov. J. Comput. Syst. Sci."},{"key":"7415_CR11","first-page":"45","volume":"10","author":"V.G. Anisimov","year":"2001","unstructured":"Anisimov, V.G., Anisimov, E.G., and Gertsev, V.N., Assessing efficiency of the system of missile and artillery armament of missile forces and artillery, Mil. Thought, 2001, vol. 10, no.\u00a04, pp. 45\u201354.","journal-title":"Mil. Thought"},{"key":"7415_CR12","first-page":"179","volume":"37","author":"V.G. Anisimov","year":"1997","unstructured":"Anisimov, V.G. and Anisimov, E.G., Modification of the method for solving a class of integer programming problems, Comp. Math. Math. Phys., 1997, vol. 37, no. 2, pp. 179\u2013183.","journal-title":"Comp. Math. Math. Phys."},{"key":"7415_CR13","doi-asserted-by":"publisher","unstructured":"Anisimov, E.G., Anisimov, V.G., and Sonkin, M.A., Mathematical simulation of adaptive allocation of discrete resources, Proc. 2016 Conf. on Information Technologies in Science, Management, Social Sphere and Medicine, \n               2016, Atlantis Press, 2016, pp. 280\u2013283. \u00a0https:\/\/doi.org\/10.2991\/itsmssm-16.2016.57","DOI":"10.2991\/itsmssm-16.2016.57"},{"key":"7415_CR14","first-page":"38127","volume":"10","author":"V. Anisimov","year":"2015","unstructured":"Anisimov, V., Anisimov, E., and Sonkin, M., A resource-and-time method to optimize the performance of several interrelated operations, Int. J. Appl. Eng. Res., 2015, vol. 10, no. 17, pp.\u00a038127\u201338132.","journal-title":"Int. J. Appl. Eng. Res."},{"key":"7415_CR15","first-page":"1827","volume":"32","author":"V.G. Anisimov","year":"1992","unstructured":"Anisimov, V.G. and Anisimov, E.G., A branch-and-bound algorithm for one class of scheduling problem, Comput. Math. Math. Phys., 1992, vol. 32, no. 12, pp. 1827\u20131832.","journal-title":"Comput. Math. Math. Phys."},{"key":"7415_CR16","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/0041-5553(89)90205-X","volume":"29","author":"V.G. Anisimov","year":"1989","unstructured":"Anisimov, V.G. and Anisimov, E.G., A method of solving one class of integer programming problems, USSR Comp. Math. Math. Phys., 1989, vol. 29, no. 5, pp. 238\u2013241. \u00a0https:\/\/doi.org\/10.1016\/0041-5553(89)90205-X","journal-title":"USSR Comp. Math. Math. Phys."},{"key":"7415_CR17","volume-title":"Nonlinear Preference and Utility Theory","author":"P.C. Fishburn","year":"1988","unstructured":"Fishburn, P.C., Nonlinear Preference and Utility Theory, Baltimore: Johns Hopkins Univ. Press, 1988."},{"key":"7415_CR18","volume-title":"Statistical Theory of Extreme Values and Some Practical Applications: A Series of Lectures.","author":"E.J. Gumbel","year":"1954","unstructured":"Gumbel, E.J., Statistical Theory of Extreme Values and Some Practical Applications: A Series of Lectures. U.S. Department of Commerce, National Bureau of Standards, 1954, vol. 33."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080277.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080277","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080277.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:00Z","timestamp":1773612240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7415"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080277","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"30 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}