{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:33Z","timestamp":1773615513968,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080368","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1188-1193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Integrity Control Model for Multidimensional Data Arrays"],"prefix":"10.3103","volume":"55","author":[{"given":"S. A.","family":"Dichenko","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7454_CR1","doi-asserted-by":"publisher","unstructured":"Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, Proc. 8th Int. Conf. on Security of Information and Networks, 2015, New York: Association for Computing Machinery, 2015, pp. 142\u2013149. https:\/\/doi.org\/10.1145\/2799979.2799995","DOI":"10.1145\/2799979.2799995"},{"key":"7454_CR2","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3103\/S014641161908025X","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895\u2013902. \u00a0https:\/\/doi.org\/10.3103\/S014641161908025X","journal-title":"Autom. Control Comput. Sci."},{"key":"7454_CR3","doi-asserted-by":"publisher","first-page":"903","DOI":"10.3103\/S0146411619080261","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A., Zegzhda, D.P., Kalinin, M.O., Big data management system security threat model, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903\u2013913. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080261","journal-title":"Autom. Control Comput. Sci."},{"key":"7454_CR4","volume-title":"Fundamentals of Information Systems Security","author":"D. Kim","year":"2018","unstructured":"Kim, D., Fundamentals of Information Systems Security, Springer, 2018."},{"key":"7454_CR5","volume-title":"Client-Side Attacks and Defense","author":"M. Bailey","year":"2012","unstructured":"Bailey, M., Client-Side Attacks and Defense, Newness, 2012."},{"key":"7454_CR6","unstructured":"Tilborg, H., Error-Correcting Codes and Cryptography, in Code-Based Cryptography Workshop, Springer, 2011."},{"key":"7454_CR7","volume-title":"Applied Cryptography","author":"B. Schneier","year":"2015","unstructured":"Schneier, B., Applied Cryptography, New York: John Wiley & Sons, 2015."},{"key":"7454_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.36724\/2409-5419-2020-12-6-48-59","volume":"12","author":"S.A. Dichenko","year":"2020","unstructured":"Dichenko, S.A. and Finko, O.A., Generalized method of applying hash functions for data integrity control, Naukoemkie Tekhnol. Kosmich. Issled. Zemli, 2020, vol. 12, no. 6, pp. 48\u201359. \u00a0https:\/\/doi.org\/10.36724\/2409-5419-2020-12-6-48-59","journal-title":"Naukoemkie Tekhnol. Kosmich. Issled. Zemli"},{"key":"7454_CR9","doi-asserted-by":"crossref","unstructured":"Dichenko, S.A. and Finko, O.A., Reduced input redundancy while providing the stability of information-analytical systems in compensating the effects caused by attacker\u2019s destructive actions, Avtom. Control Process., 2020, no. 4, pp. 38\u201348.","DOI":"10.35752\/1991-2927-2020-4-62-38-48"},{"key":"7454_CR10","first-page":"417","volume":"4","author":"S. Mueller","year":"1969","unstructured":"Mueller, S., Recursions associated with Pascal\u2019s pyramid, Pi Mu Epsilon J., 1969, vol. 4, no. 10, pp. 417\u2013422.","journal-title":"Pi Mu Epsilon J."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080368.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080368","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080368.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:58Z","timestamp":1773612058000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7454"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080368","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"20 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}