{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:13Z","timestamp":1773655633607,"version":"3.50.1"},"reference-count":23,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080332","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1020-1024","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity"],"prefix":"10.3103","volume":"55","author":[{"given":"P. D.","family":"Zegzhda","sequence":"first","affiliation":[]},{"given":"V. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"E. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"T. N.","family":"Saurenko","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Los\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7430_CR1","first-page":"6259","volume":"9","author":"T.N. Saurenko","year":"2020","unstructured":"Saurenko, T.N., Anisimov, V.G., Anisimov, E.G., and Sonkin, M.A., Methodology control function realization within the electronic government concept framework, Int. J. Sci. Technol. Res., 2020, vol. 9, no. 2, pp.\u00a06259\u20136262.","journal-title":"Int. J. Sci. Technol. Res."},{"key":"7430_CR2","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/S0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080035","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR3","doi-asserted-by":"publisher","unstructured":"Zegzhda, D. and Stepanova, T., Achieving Internet of Things security via providing topological sustainability, Science and Information Conf. (SAI), London, 2015, IEEE, 2015, pp. 269\u2013276. \u00a0https:\/\/doi.org\/10.1109\/SAI.2015.7237154","DOI":"10.1109\/SAI.2015.7237154"},{"key":"7430_CR4","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3103\/S0146411616080289","volume":"50","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717\u2013721. \u00a0https:\/\/doi.org\/10.3103\/S0146411616080289","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR5","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, p. 012006. \u00a0https:\/\/doi.org\/10.1088\/1757-899X\/497\/1\/012006","DOI":"10.1088\/1757-899X\/497\/1\/012006"},{"key":"7430_CR6","doi-asserted-by":"publisher","unstructured":"Ivanov, D., Kalinin, M., Krundyshev, V., and Orel, E., Automatic security management of smart infrastructures using attack graph and risk analysis, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 295\u2013300. \u00a0https:\/\/doi.org\/10.1109\/WorldS450073.2020.9210410","DOI":"10.1109\/WorldS450073.2020.9210410"},{"key":"7430_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/0167-4048(87)90122-2","volume":"6","author":"F. Cohen","year":"1987","unstructured":"Cohen, F., Computer viruses: theory and experiments, Comput. Secur., 1987, vol. 6, no. 1, pp. 22\u201335. \u00a0https:\/\/doi.org\/10.1016\/0167-4048(87)90122-2","journal-title":"Comput. Secur."},{"key":"7430_CR8","unstructured":"Kozlov, D.A., Parandovskii, A.A., and Parandovskii, A.K., Entsiklopediya komp\u2019yuternykh virusov (Encyclopedia of Computer Viruses), Moscow: Solon-R, 2010."},{"key":"7430_CR9","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931\u2013935. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080187","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR10","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080144","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR11","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., The security risk analysis methodology for smart network environments, Int. Russian Automation Conf. (RusAutoCon), Sochi, Russia, 2020, IEEE, 2020, pp. 437\u2013442. \u00a0https:\/\/doi.org\/10.1109\/RusAutoCon49822.2020.9208116","DOI":"10.1109\/RusAutoCon49822.2020.9208116"},{"key":"7430_CR12","doi-asserted-by":"publisher","unstructured":"Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Zotova, E.A., Models of forecasting destructive influence risks for information processes in management systems, Inf. Control Syst., 2019, no. 5, pp. 18\u201323. https:\/\/doi.org\/10.31799\/1684-8853-2019-5-18-23","DOI":"10.31799\/1684-8853-2019-5-18-23"},{"key":"7430_CR13","unstructured":"Saurenko, T.N., Anisimov, E.G., Anisimov, V.G., Suprun, A.F., and Kasatkin, V.V., Prediction of information security incidents, Probl. Inf. Bezop. Komp\u2019yut. Sist., 2019, no. 3, pp.\u00a024\u201328."},{"key":"7430_CR14","unstructured":"Zegzhda, P.D., Suprun, A.F., Anisimov, V.G., Tebekin, A.V., and Anisimov, E.G., Methodical approach to construction of models of forecasting of indicators of properties of information security systems, Probl. Inf. Bezop. Komp\u2019yut. Sist., 2019, no. 4, pp. 45\u201349."},{"key":"7430_CR15","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/S0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol.\u00a051, no. 8, pp. 824\u2013828. https:\/\/doi.org\/10.3103\/S0146411617080053","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR16","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1098\/rspa.1927.0118","volume":"115","author":"W.O. Kermack","year":"1927","unstructured":"Kermack, W.O. and McKendrick, A.G., A contribution to the mathematical theory of epidemics, Proc. R. Soc. London. Ser. A, 1927, vol. 115, no. 772, pp. 700\u2013721. \u00a0https:\/\/doi.org\/10.1098\/rspa.1927.0118","journal-title":"Proc. R. Soc. London. Ser. A"},{"key":"7430_CR17","doi-asserted-by":"crossref","unstructured":"Kotenko, I.V. and Vorontsov, V.V., Analytical models of network worm propagation, Tr. SPIIRAN, 2007, no. 4, pp. 208\u2013224.","DOI":"10.15622\/sp.4.15"},{"key":"7430_CR18","doi-asserted-by":"publisher","first-page":"864","DOI":"10.3103\/S0146411620080362","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Sem\u2019yanov, P.V., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., Approach to the evaluation of the efficiency of information security in control systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 864\u2013870. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080362","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR19","doi-asserted-by":"publisher","unstructured":"Kephart, J.O. and White, S.R., Directed-graph epidemiological models of computer viruses, Proc. IEEE Computer Society Symp. on Research in Security and Privacy, Oakland, Calif., 1991, IEEE, 1991, pp. 343\u2013359.\u00a0https:\/\/doi.org\/10.1109\/RISP.1991.130801","DOI":"10.1109\/RISP.1991.130801"},{"key":"7430_CR20","doi-asserted-by":"publisher","first-page":"930","DOI":"10.3103\/S0146411620080374","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., A model of optimal complexification of measures providing information security, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 930\u2013936. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080374","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR21","volume-title":"Rhodes-Ousley, M., and Strassberg, K., Network Security: The Complete Reference","author":"R. Bragg","year":"2003","unstructured":"Bragg, R., Rhodes-Ousley, M., and Strassberg, K., Network Security: The Complete Reference, McGraw-Hill, 2003."},{"key":"7430_CR22","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.3103\/S0146411619080054","volume":"53","author":"V.G. Anisimov","year":"2019","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., Saurenko, T.N., and Kasatkin, V.V., Model and method for optimizing computational processes in parallel computing systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1038\u20131044. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080054","journal-title":"Autom. Control Comput. Sci."},{"key":"7430_CR23","unstructured":"Anisimov, E.G., Anisimov, V.G., Gar\u2019kushev, A.Yu., and Selivanov, A.A., Indicators of the effectiveness of interagency communications in the management of the defense of the state, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistviya Terrorizmu, 2016, nos. 7\u20138, pp. 12\u201316."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080332.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080332","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080332.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:43Z","timestamp":1773612343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":23,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7430"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080332","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"29 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}