{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:39Z","timestamp":1773615519225,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.3103\/s0146411622080016","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T14:03:23Z","timestamp":1677593003000},"page":"883-887","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Evaluation of Antivirus Systems for Computer Networks"],"prefix":"10.3103","volume":"56","author":[{"given":"V. G.","family":"Anisimov","sequence":"first","affiliation":[]},{"given":"E. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"T. N.","family":"Saurenko","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Los\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2023,2,28]]},"reference":[{"key":"7543_CR1","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3103\/S0146411618080254","volume":"52","author":"Yu.S. Vasil\u2019ev","year":"2018","unstructured":"Vasil\u2019ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no.\u00a08, pp. 1090\u20131100. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080254","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR2","doi-asserted-by":"publisher","unstructured":"Anisimov, V., Digital transformation and optimization models in the sphere of logistics, SHS Web Conf., 2018, vol. 44, p. 00009. \u00a0https:\/\/doi.org\/10.1051\/shsconf\/20184400009","DOI":"10.1051\/shsconf\/20184400009"},{"key":"7543_CR3","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Lavrova, D., and Khushkeev, A., Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series, 2019 IEEE Int. Conf. on Industrial Cyber Physical Systems (ICPS), Taipei, 2019, IEEE, 2019, pp. 780\u2013784. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2019.8780304","DOI":"10.1109\/ICPHYS.2019.8780304"},{"key":"7543_CR4","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/S0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080035","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR5","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.3390\/sym13122453","volume":"13","author":"D. Zegzhda","year":"2021","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. \u00a0https:\/\/doi.org\/10.3390\/sym13122453","journal-title":"Symmetry"},{"key":"7543_CR6","first-page":"6259","volume":"9","author":"T.N. Saurenko","year":"2020","unstructured":"Saurenko, T.N., Anisimov, V.G., Anisimov, E.G., and Sonkin, M.A., Methodology control function realization within the electronic government concept framework, Int. J. Sci. Technol. Res., 2020, vol. 9, no. 2, pp.\u00a06259\u20136262.","journal-title":"Int. J. Sci. Technol. Res."},{"key":"7543_CR7","doi-asserted-by":"publisher","first-page":"864","DOI":"10.3103\/S0146411620080362","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Sem\u2019yanov, P.V., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., Approach to the evaluation of the efficiency of information security in control systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 864\u2013870. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080362","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR8","doi-asserted-by":"publisher","unstructured":"Anisimov, V.G., Anisimiov, E.G., Saurenko, T.N., and Zotova, E.A., Models of forecasting destructive influence risks for information processes in management systems, Inf. Control Syst., 2019, no. 5, pp. 18\u201323. \u00a0https:\/\/doi.org\/10.31799\/1684-8853-2019-5-18-23","DOI":"10.31799\/1684-8853-2019-5-18-23"},{"key":"7543_CR9","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, pp. 912\u2013917. https:\/\/doi.org\/10.3103\/S0146411618080151","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR10","doi-asserted-by":"publisher","first-page":"864","DOI":"10.3103\/S0146411620080362","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Sem\u2019yanov, P.V., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., Approach to the evaluation of the efficiency of information security in control systems, Autom. Control Comput. Sci., 2020, vol. 54, pp. 864\u2013870. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080362","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR11","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, pp. 931\u2013935. https:\/\/doi.org\/10.3103\/S0146411618080187","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR12","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3103\/S0146411616080289","volume":"50","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717\u2013721. \u00a0https:\/\/doi.org\/10.3103\/S0146411616080289","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR13","doi-asserted-by":"publisher","first-page":"387","DOI":"10.3103\/S0146411619050067","volume":"53","author":"D.S. Lavrova","year":"2019","unstructured":"Lavrova, D.S., Zaitseva, E.A., and Zegzhda, D.P., Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 387\u2013392. \u00a0https:\/\/doi.org\/10.3103\/S0146411619050067","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR14","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/S0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 824\u2013828. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080053","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR15","doi-asserted-by":"publisher","first-page":"930","DOI":"10.3103\/S0146411620080374","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019,\u00a0V.P., A model of optimal complexification of measures providing information security, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 930\u2013936. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080374","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR16","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/S0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 824\u2013828. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080053","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR17","doi-asserted-by":"publisher","unstructured":"Zotova, E., Tebekin, A., Yastrebov, O., and Borremans, A., Realization of the energy strategy of the Russian Federation regarding the transportation of energy resources, E3S Web Conf., 2019, vol. 110, p. 02053. https:\/\/doi.org\/10.1051\/e3sconf\/201911002053","DOI":"10.1051\/e3sconf\/201911002053"},{"key":"7543_CR18","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.3103\/S0146411619080054","volume":"53","author":"V.G. Anisimov","year":"2019","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., Saurenko, T.N., and Kasatkin, V.V., Model and method for optimizing computational processes in parallel computing systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1038\u20131044. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080054","journal-title":"Autom. Control Comput. Sci."},{"key":"7543_CR19","doi-asserted-by":"publisher","first-page":"07025","DOI":"10.1051\/e3sconf\/202021707025","volume":"217","author":"V. Anisimov","year":"2020","unstructured":"Anisimov, V., Anisimov, E., and Saurenko, T., Efficiency of ensuring the survivability of logistics information and control systems, E3S Web. \n               Conf., 2020, vol. 217, p. 07025. \u00a0https:\/\/doi.org\/10.1051\/e3sconf\/202021707025","journal-title":"Conf."},{"key":"7543_CR20","doi-asserted-by":"publisher","unstructured":"Zotova, E., Anisimov, V., Anisimov, E., Melnik, D., and Chernysh, A., A model for setting up development programs for logistics systems in the electric power industry to achieve electric power security, E3S Web Conf., 2021, vol. 258, p. 02027.\u00a0https:\/\/doi.org\/10.1051\/e3sconf\/202125802027","DOI":"10.1051\/e3sconf\/202125802027"},{"key":"7543_CR21","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1103\/PhysRev.106.620","volume":"106","author":"E.T. Jaynes","year":"1957","unstructured":"Jaynes, E.T., Information theory and statistical mechanics, Phys. Rev., 1957, vol. 106, p.\u00a0620. https:\/\/doi.org\/10.1103\/PhysRev.106.620","journal-title":"Phys. Rev."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080016.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411622080016","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622080016.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:02Z","timestamp":1773612062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411622080016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["7543"],"URL":"https:\/\/doi.org\/10.3103\/s0146411622080016","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"9 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}