{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:05:10Z","timestamp":1773615910058,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080290","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1099-1103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident"],"prefix":"10.3103","volume":"55","author":[{"given":"S. I.","family":"Smirnov","sequence":"first","affiliation":[]},{"given":"M. A.","family":"Eremeev","sequence":"additional","affiliation":[]},{"given":"I. A.","family":"Pribylov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7440_CR1","unstructured":"Positive technologies report \u201cCybersecurity 2020\u20132021\u201d. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/ kiberbezopasnost-2020-2021\/. Cited February 21, 2021."},{"key":"7440_CR2","unstructured":"Smirnov, S.I., Eremeev, M.A., Gorbachev, I.E., Nefedov, V.S., and Izergin, D.A., Analysis of techniques and tools used by an attacker when moving horizontally in the corporate network, Zashchita Inf. Insaid, 2021, no. 1, pp. 58\u201361."},{"key":"7440_CR3","doi-asserted-by":"publisher","unstructured":"Makarenko, S.I. and Smirnov, G.E., Analysis of penetration testing standards and methodologies, Sist. Upr., Svyazi Bezop., 2020, no. 4, pp. 44\u201372. https:\/\/doi.org\/10.24411\/2410-9916-2020-10402","DOI":"10.24411\/2410-9916-2020-10402"},{"key":"7440_CR4","doi-asserted-by":"publisher","unstructured":"Frolov, P.V., Vershinin, E.V., and Medvedeva, S.A. Research of network attacks detection methods, Vopr. Radioelektron., 2019, no. 11, pp. 55\u201359. \u00a0https:\/\/doi.org\/10.21778\/2218-5453-2019-11-55-59","DOI":"10.21778\/2218-5453-2019-11-55-59"},{"key":"7440_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.32362\/2500-316X-2019-7-6-44-55","volume":"7","author":"D.A. Izergin","year":"2019","unstructured":"Izergin, D.A., Eremeev, M.A., Magomedov, Sh.G., and Smirnov, S.I., Information security evaluation for Android mobile operating system, Russ. Tekhnol. J., 2019, vol. 7, no. 6, pp. 44\u201355. \u00a0https:\/\/doi.org\/10.32362\/2500-316X-2019-7-6-44-55","journal-title":"Russ. Tekhnol. J."},{"key":"7440_CR6","unstructured":"Abasheva, I.V., Eremeev, M.A., Kriulin, A.A., Nefedov, V.S., and Poterpeev, G.Yu., Application of machine learning methods to the tasks of detecting malicious software, Tr. Voenno-Kosmich. Akad. Im. Mozhaiskogo, 2020, no. 675, pp. 164\u2013171."},{"key":"7440_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.32362\/2500-316X-2020-8-6-34-46","volume":"8","author":"S.G. Magomedov","year":"2020","unstructured":"Magomedov, S.G., Kolyasnikov, P.V., and Nikulchev, E.V., Development of technology for controlling access to digital portals and platforms based on estimates of user reaction time built into the interface, Russ. Tekhnol. J., 2020, vol. 8, no. 6, pp. 34\u201346. \u00a0https:\/\/doi.org\/10.32362\/2500-316X-2020-8-6-34-46","journal-title":"Russ. Tekhnol. J."},{"key":"7440_CR8","series-title":"Accelerating online change-point detection algorithm using 10 GbE FPGA NIC","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10549-5_40","volume-title":"Euro-Par 2018: Parallel Processing Workshops","author":"T. Iwata","year":"2019","unstructured":"Iwata, T., Nakamura, K., Tokusashi, Yu., and Matsutani, H., Accelerating online change-point detection algorithm using 10 GbE FPGA NIC, Euro-Par 2018: Parallel Processing Workshops, Mencagli, G., Heras, D.B., Cardellini, V., Casalicchio, E., Jeannot, E., Wolf, F., Salis, A., Schifanella, C., Manumachu, R.R., Ricci, L., Beccuti, M., Antonelli, L., Garcia Sanchez, J.D., and Scott, S.L., Eds., Lecture Notes in Computer Science, vol. 11339, Cham: Springer, 2019, pp. 506\u2013517. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-10549-5_40"},{"key":"7440_CR9","unstructured":"Feng, X., Huang, J., Jiao, Yu., and Zhang, Sh., l\n               0-regularized high-dimensional accelerated failure time model, 2020. arXiv:2002.03318 [stat.ME]"},{"key":"7440_CR10","doi-asserted-by":"publisher","unstructured":"Yamanishi, K. and Takeuchi, J., A unifying framework for detection outliers and change points from non-stationary time series data, Proc. Eigth ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, New York: Association for Computing Machinery, 2002, pp. 676\u2013681. \u00a0https:\/\/doi.org\/10.1145\/775047.775148","DOI":"10.1145\/775047.775148"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080290.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080290","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080290.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:54Z","timestamp":1773612414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7440"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080290","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"10 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}