{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:38Z","timestamp":1773615518632,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080381","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1222-1227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization"],"prefix":"10.3103","volume":"55","author":[{"given":"V. V.","family":"Gryzunov","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7459_CR1","doi-asserted-by":"publisher","first-page":"962","DOI":"10.3103\/S0146411620080325","volume":"54","author":"I.A. Sikarev","year":"2020","unstructured":"Sikarev, I.A., Chistyakov, G.B., Garanin, A.V., and Moskvin, D.A., Algorithms for enhancing information security in the processing of navigation data of unmanned vessels of the technical fleet of the inland waterways of the Russian Federation, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 962\u2013965. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080325","journal-title":"Autom. Control Comput. Sci."},{"key":"7459_CR2","doi-asserted-by":"publisher","first-page":"012023","DOI":"10.1088\/1742-6596\/1703\/1\/012023","volume":"1703","author":"V.G. Burlov","year":"2020","unstructured":"Burlov, V.G., Gryzunov, V.V., and Tatarnikova, T.M., Threats of information security in the application of GIS in the interests of the digital economy, J. Phys.: Conf. Ser., 2020, vol. 1703, p. 012023. \u00a0https:\/\/doi.org\/10.1088\/1742-6596\/1703\/1\/012023","journal-title":"J. Phys.: Conf. Ser."},{"key":"7459_CR3","unstructured":"Kalinin, V.N., Teoreticheskie osnovy sistemnykh issledovanii: kratkii avtorskii kurs lektsiya dlya ad\u201dyunktov akademii (Theoretical Foundations of Systems Research: Brief Lecture Notes for Academy Service Students), St.\u00a0Petersburg: Voen. Kosmich. Akad. Mozhaiskogo, 2011."},{"key":"7459_CR4","unstructured":"GOST R 52438-2005: Geographical Information Systems. Terms and Definitions, 2018."},{"key":"7459_CR5","doi-asserted-by":"crossref","unstructured":"Gryzunov, V.V., Model of purpose aggressive actions on the information-computing system, in Chelovecheskii faktor v slozhnykh tekhnicheskikh sistemakh i sredakh (Ergo-2018) (Human Factor in Complex Technical Systems and Environments (Ergo-2018)), Anokhin, A.N., Oboznov, A.A., Paderno, P.I., and Sergeev, S.F., Eds., St. Petersburg: Ergonomicheskaya Assotsiatsiya, 2018.","DOI":"10.1109\/ERGO.2018.8443814"},{"key":"7459_CR6","doi-asserted-by":"publisher","unstructured":"Bibashov, S.A., The model of formation the requirements for information security to the developed automated systems in the protected execution, Vopr. Kiberbezop., 2017, no. 5, pp. 83\u201390. https:\/\/doi.org\/10.21681\/2311-3456-2017-5-83-90","DOI":"10.21681\/2311-3456-2017-5-83-90"},{"key":"7459_CR7","unstructured":"Rastrigin, L.A., Adaptatsiya slozhnykh sistem (Adaptation of Complex Systems), Riga: Zinatne, 1981."},{"key":"7459_CR8","doi-asserted-by":"publisher","first-page":"647","DOI":"10.21821\/2309-5180-2018-10-3-647-657","volume":"10","author":"V.V. Sakharov","year":"2018","unstructured":"Sakharov, V.V., Sikarev, I.A., and Chertkov, A.A., Automating search optimal routes and goods flows in transport networks by means of the integer linear programming, Vestn. Gos. Univ. Morskogo Rechnogo Flota Adm. Makarova, 2018, vol. 10, no. 3, pp. 647\u2013657. \u00a0https:\/\/doi.org\/10.21821\/2309-5180-2018-10-3-647-657","journal-title":"Vestn. Gos. Univ. Morskogo Rechnogo Flota Adm. Makarova"},{"key":"7459_CR9","doi-asserted-by":"publisher","unstructured":"Kalinin, M. Zegzhda, P. Zegzhda, D., Vasiliev, Yu., and Belenko, V., Software defined security for vehicular ad hoc networks, Int. Conf. on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 2016, IEEE, 2016, pp. 533\u2013537. \u00a0https:\/\/doi.org\/10.1109\/ICTC.2016.7763528","DOI":"10.1109\/ICTC.2016.7763528"},{"key":"7459_CR10","doi-asserted-by":"publisher","first-page":"012016","DOI":"10.1088\/1742-6596\/1703\/1\/012016","volume":"1703","author":"V.G. Burlov","year":"2020","unstructured":"Burlov, V.G. and Gryzunov, V.V., Evaluation of the effectiveness of geographic information systems adaptation to destabilizing factors, J. Phys.: Conf. Ser., 2020, vol. 1703, p. 012016. https:\/\/doi.org\/10.1088\/1742-6596\/1703\/1\/012016","journal-title":"J. Phys.: Conf. Ser."},{"key":"7459_CR11","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1134\/S1064230720020124","volume":"59","author":"D.P. Zegzhda","year":"2020","unstructured":"Zegzhda, D.P., Lavrova, D.S., and Pavlenko, E.Yu., Management of a dynamic infrastructure of complex systems under conditions of directed cyber attacks, J. Comput. Syst. Sci. Int., 2020, vol. 59, no. 3, pp. 358\u2013370. \u00a0https:\/\/doi.org\/10.1134\/S1064230720020124","journal-title":"J. Comput. Syst. Sci. Int."},{"key":"7459_CR12","doi-asserted-by":"publisher","unstructured":"Tatarnikova, T.M., Analytical-statistical model of mesh network survivability evaluation, Inf.-Upr. Sist., 2017, no. 1, pp. 17\u201322. \u00a0https:\/\/doi.org\/10.15217\/issnl684-8853.2017.1.17","DOI":"10.15217\/issnl684-8853.2017.1.17"},{"key":"7459_CR13","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.17586\/2226-1494-2016-16-6-1120-1127","volume":"16","author":"T.M. Tatarnikova","year":"2016","unstructured":"Tatarnikova, T.M. and Elizarov, M.A., Virtual channel simulation model, Nauch.-Tekh. Vestn. Inf. Tekhnol., \n               Mekh. Opt., 2016, vol. 16, no. 6, pp. 1120\u20131127. \u00a0https:\/\/doi.org\/10.17586\/2226-1494-2016-16-6-1120-1127","journal-title":"Mekh. Opt."},{"key":"7459_CR14","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1007\/s11277-017-5200-5","volume":"102","author":"Y. Sun","year":"2018","unstructured":"Sun, Y., Lin, F., and Xu, H., Multi-objective optimization of resource scheduling in fog computing using an improved NSGA-II, Wireless Pers. Commun., 2018, vol. 102, no. 2, pp. 1369\u20131385. https:\/\/doi.org\/10.1007\/s11277-017-5200-5","journal-title":"Wireless Pers. Commun."},{"key":"7459_CR15","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/JCN.2018.000036","volume":"20","author":"B. Jia","year":"2018","unstructured":"Jia, B., Hu, H., Zeng, Y., Xu, T., and Yang, Y., Double-matching resource allocation strategy in fog computing networks based on cost efficiency, J. Commun. Networks, 2018, vol. 20, no. 3, pp. 237\u2013246. \u00a0https:\/\/doi.org\/10.1109\/JCN.2018.000036","journal-title":"J. Commun. Networks"},{"key":"7459_CR16","unstructured":"Melnik, E.V., Klimenko, A.B., and Klimenko, V.V., Information and control system computational tasks distribution technique in the edge- and for-computing environments, Izv. Tul. Gos. Univ. Tekh. Nauki, 2019, no. 2, pp. 320\u2013330."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080381.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080381","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080381.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:01Z","timestamp":1773612061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7459"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080381","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"15 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}