{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:19Z","timestamp":1773615679157,"version":"3.50.1"},"reference-count":30,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080345","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"855-861","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of the Effectiveness of an Information Security System"],"prefix":"10.3103","volume":"57","author":[{"given":"D. P.","family":"Zegzhda","sequence":"first","affiliation":[]},{"given":"T. N.","family":"Saurenko","sequence":"additional","affiliation":[]},{"given":"V. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"E. G.","family":"Anisimov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7642_CR1","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3103\/S0146411618080254","volume":"52","author":"Yu.S. Vasil\u2019ev","year":"2018","unstructured":"Vasil\u2019ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090\u20131100. https:\/\/doi.org\/10.3103\/S0146411618080254","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR2","unstructured":"Andreev, Yu.S., Dergachev, A.M., and Chernykh, A.K., Information security of automated working places in case of emergencies, Intellektual\u2019nye Tekhnol. Transp., 2019, no. 1, pp. 27\u201332."},{"key":"7642_CR3","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/s0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Yu., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880. https:\/\/doi.org\/10.3103\/s0146411617080296","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR4","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.3390\/en15114123","volume":"15","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Zegzhda, D., and Zavadskii, E., Protection of energy network infrastructures applying a dynamic topology virtualization, Energies, 2022, vol. 15, no. 11, p. 4123. https:\/\/doi.org\/10.3390\/en15114123","journal-title":"Energies"},{"key":"7642_CR5","first-page":"6259","volume":"9","author":"T.N. Saurenko","year":"2020","unstructured":"Saurenko, T.N., Methodology control function realization within the electronic government concept framework, Int. J. Sci. Technol. Res., 2020, vol. 9, no. 2, pp. 6259\u20136262.","journal-title":"Int. J. Sci. Technol. Res."},{"key":"7642_CR6","doi-asserted-by":"publisher","first-page":"903","DOI":"10.3103\/S0146411621080277","volume":"55","author":"V.G. Anisimov","year":"2021","unstructured":"Anisimov, V.G., Saurenko, T.N., Anisimov, E.G., Kasatkin, V.V., and Los, V.P., Information security incident forecasting, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 903\u2013907. https:\/\/doi.org\/10.3103\/S0146411621080277","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR7","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Dremov, A., Detecting Android application malicious behaviors based on the analysis of control flows and data flows, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 280\u2013286. https:\/\/doi.org\/10.1145\/3136825.3140583","DOI":"10.1145\/3136825.3140583"},{"key":"7642_CR8","unstructured":"Solokhov, I.V., Problems of scientific-methodological support of interdepartmental information interaction, Voennaya Mysl\u2019, 2017, no. 12, pp. 45\u201351."},{"key":"7642_CR9","doi-asserted-by":"publisher","unstructured":"Anisimov, V., Anisimov, E., and Saurenko, T., Efficiency of ensuring the survivability of logistics information and control systems, E3S Web Conf., 2020, vol. 217, p. 07025. https:\/\/doi.org\/10.1051\/e3sconf\/202021707025","DOI":"10.1051\/e3sconf\/202021707025"},{"key":"7642_CR10","doi-asserted-by":"publisher","first-page":"978","DOI":"10.3103\/s0146411617080302","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Moskvin, D.A., and Dakhnovich, A.D., Protection of Wi-Fi network users against rogue access points, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 978\u2013984. https:\/\/doi.org\/10.3103\/s0146411617080302","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR11","doi-asserted-by":"publisher","unstructured":"Anisimov, V., Anisimov, E., Saurenko, T., and Zotova, E., Models of forecasting destructive influence risks for information processes in management systems, Inf.-Upr. Sist., 2019, no. 5, pp. 18\u201323. https:\/\/doi.org\/10.31799\/1684-8853-2019-5-18-23","DOI":"10.31799\/1684-8853-2019-5-18-23"},{"key":"7642_CR12","doi-asserted-by":"publisher","first-page":"864","DOI":"10.3103\/s0146411620080362","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Sem\u2019yanov, P.V., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., Approach to the evaluation of the efficiency of information security in control systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 864\u2013870. https:\/\/doi.org\/10.3103\/s0146411620080362","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR13","unstructured":"Zaitseva, E.A., Lavrova, D.S., and Zegzhda, D.P., Neutralization of consequences of destructive actions by means of applying the graph theory for reconfiguration of the system\u2019s structure, Metody Tekh. Sredstva Obespecheniya Bezopasnosti Inf., 2019, no. 28, pp. 7\u20138."},{"key":"7642_CR14","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.3103\/s0146411621080332","volume":"55","author":"P.D. Zegzhda","year":"2021","unstructured":"Zegzhda, P.D., Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., Operational efficiency of computer networks under conditions of malicious cyber activity, Autom. Control Comput. Sci., 2021, vol. 55, no.\u00a08, pp. 1020\u20131024. https:\/\/doi.org\/10.3103\/s0146411621080332","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR15","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3103\/s0146411616080289","volume":"50","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717\u2013721. https:\/\/doi.org\/10.3103\/s0146411616080289","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR16","doi-asserted-by":"publisher","first-page":"813","DOI":"10.3103\/s0146411616080253","volume":"50","author":"D.P. Zegzhda","year":"2016","unstructured":"Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813\u2013819. https:\/\/doi.org\/10.3103\/s0146411616080253","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR17","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/s0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 824\u2013828. https:\/\/doi.org\/10.3103\/s0146411617080053","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR18","doi-asserted-by":"publisher","first-page":"848","DOI":"10.3103\/s0146411617080284","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Usov, E.S., Nikol\u2019skii, A.V., and Pavlenko, E.Yu., Use of Intel SGX to ensure the confidentiality of data of cloud users, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 848\u2013854. https:\/\/doi.org\/10.3103\/s0146411617080284","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR19","unstructured":"Vilkov, V.B., Chernykh, A.K., and Dergachev, A.I., About one approach to creation of information-secure communication systems, Intellektual\u2019nye Tekhnol. Transp., 2019, no. 2, pp. 15\u201320."},{"key":"7642_CR20","doi-asserted-by":"publisher","first-page":"930","DOI":"10.3103\/s0146411620080374","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., A model of optimal complexification of measures providing information security, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 930\u2013936. https:\/\/doi.org\/10.3103\/s0146411620080374","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR21","doi-asserted-by":"publisher","unstructured":"Saurenko, T., Anisimov, V., Anisimov, E., and Levina, A., Comparing investment projects of innovative developing strategies of municipalities, based on a set of indicators, MATEC Web Conf., 2018, vol. 170, p. 01038. https:\/\/doi.org\/10.1051\/matecconf\/201817001038","DOI":"10.1051\/matecconf\/201817001038"},{"key":"7642_CR22","unstructured":"Anisimov, V.G., Anisimov, E.G., and Botvin, G.A., Investitsionnyi analiz v usloviyakh neopredelennosti (Investment Analysis under Uncertainty Conditions), St. Petersburg: 2006, vol. 288."},{"key":"7642_CR23","unstructured":"Il\u2019in, I.V., Anisimov, V.G., Anisimov, E.G., Botvin, G.A., Gapov, M.R., Gasyuk, D.P., Il\u2019yashenko, O.Yu., Levina, A.I., Rodionova, E.S., and Saurenko, T.N., Matematicheskie metody i instrumental\u2019nye sredstva otsenivaniya effektivnosti investitsii v innovatsionnye proekty (Mathematical Methods and Instrumental Tools for Assessing Investment Efficiency to Innovation Projects), St. Petersburg: Strategii Budushchego, 2018."},{"key":"7642_CR24","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/s0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The Problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110. https:\/\/doi.org\/10.3103\/s0146411618080035","journal-title":"Autom. Control Comput. Sci."},{"key":"7642_CR25","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the Learning Automaton Model for Ensuring Cyber Resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7642_CR26","doi-asserted-by":"publisher","unstructured":"Saurenko, T., Anisimov, V., Anisimov, E., and Bagaeva, I., Conceptual provisions for assessing the effectiveness of energy saving, E3S Web Conf., 2018, vol. 110, p. 02066. https:\/\/doi.org\/10.1051\/e3sconf\/201911002066","DOI":"10.1051\/e3sconf\/201911002066"},{"key":"7642_CR27","doi-asserted-by":"publisher","unstructured":"Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 24. https:\/\/doi.org\/10.1145\/3264437.3264463","DOI":"10.1145\/3264437.3264463"},{"key":"7642_CR28","doi-asserted-by":"publisher","unstructured":"Anisimov, V., Anisimov, E., and Chernysh, A., Model and algorithm for substantiating solutions for organization of high-rise construction project, E3S Web Conf., 2018, vol. 33, p. 03003. https:\/\/doi.org\/10.1051\/e3sconf\/20183303003","DOI":"10.1051\/e3sconf\/20183303003"},{"key":"7642_CR29","doi-asserted-by":"publisher","unstructured":"Saurenko, T., Anisimov, V., Anisimov, E., Smolenskiy, A., and Grashchenko, N., Justification of financing of measures to prevent accidents in power systems, International Scientific Conference Energy Management of Municipal Facilities and Sustainable Energy Technologies EMMFT 2018, Murgul, V. and Pasetti, M., Eds., Advances in Intelligent Systems and Computing, vol. 983, Cham: Springer, 2019, pp. 295\u2013305. https:\/\/doi.org\/10.1007\/978-3-030-19868-8_30","DOI":"10.1007\/978-3-030-19868-8_30"},{"key":"7642_CR30","doi-asserted-by":"publisher","unstructured":"Zaychenko, I., Grashchenko, N., Saurenko, T., Anisimov, V., Anisimov, E., and Zhigulin, V., Models for predicting damage due to accidents at energy objects and in energy systems of enterprises, E3S Web Conf., 2019, vol.\u00a0110, p. 02041. https:\/\/doi.org\/10.1051\/e3sconf\/201911002041","DOI":"10.1051\/e3sconf\/201911002041"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080345.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080345","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080345.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:13Z","timestamp":1773612193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7642"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080345","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"13 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}