{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:37Z","timestamp":1773655597791,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080357","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"881-885","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems"],"prefix":"10.3103","volume":"57","author":[{"given":"D. P.","family":"Zegzhda","sequence":"first","affiliation":[]},{"given":"A. F.","family":"Suprun","sequence":"additional","affiliation":[]},{"given":"V. G.","family":"Anisimov","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Tebekin","sequence":"additional","affiliation":[]},{"given":"E. G.","family":"Anisimov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7646_CR1","unstructured":"Anisimov, A.V., Anisimov, A.E., Anisimov, V.G., Anisimov, E.G., and Barabanov, V.V., Problem of comparison and selection of a design variant of security system, Aktual\u2019nye problemy zashchity i bezopasnosti. Trudy Chetvertoi Vserossiiskoi nauchno-prakticheskoi konferentsii (Topical Problems of Protection and Security: Proc. 4th\u00a0All-Russian Sci.-Pract. Conf.), Komyazhenko, A.G., Ed., St. Petersburg: Nauchn.-Proizvod. Ob\u2019\u2019edinenie Spetsial\u2019nykh Mater., 2001, pp. 348\u2013351."},{"key":"7646_CR2","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3103\/s0146411617080053","volume":"51","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 824\u2013828. https:\/\/doi.org\/10.3103\/s0146411617080053","journal-title":"Autom. Control Comput. Sci."},{"key":"7646_CR3","unstructured":"Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., and Saurenko, T.N., Models and method of supporting decision-making to ensure information security of information-control systems, Probl. Inf. Bezop. Komp\u2019yuternye Sist., 2018, no. 1, pp. 43\u201347."},{"key":"7646_CR4","unstructured":"Anisimov, V.G., Anisimov, E.G., Bogoeva, E.M., and Lipatova, N.G., Latent effect calculation method of using risk management system, Vestn. Ross. Tamozhennoi Akad., 2015, no. 2, pp. 115\u2013123."},{"key":"7646_CR5","volume-title":"Strategicheskoe upravlenie innovatsionnoi deyatel\u2019nost\u2019yu. Analiz, planirovanie, modelirovanie, prinyatiya reshenii, organizatsiya, otsenka (Strategic Management of Innovation Activity: Analysis, Planning, Modeling, Decision Making, Organization, Assessmen","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Gapov, M.R., Rodionova, E.S., Saurenko, T.N., Silkina, G.Yu., and Tebekin, A.V., Strategicheskoe upravlenie innovatsionnoi deyatel\u2019nost\u2019yu. Analiz, planirovanie, modelirovanie, prinyatiya reshenii, organizatsiya, otsenka (Strategic Management of Innovation Activity: Analysis, Planning, Modeling, Decision Making, Organization, Assessment), Tebekin, A.V., Ed., St. Petersburg: Strategiya Budushchego, 2017."},{"key":"7646_CR6","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/s0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110. https:\/\/doi.org\/10.3103\/s0146411618080035","journal-title":"Autom. Control Comput. Sci."},{"key":"7646_CR7","volume-title":"Upravlenie innovatsiyami (Management of Innovations)","author":"V.G. Anisimov","year":"2017","unstructured":"Anisimov, V.G., Anisimov, E.G., Blau, S.L., Mantusov, V.B., Novikov, V.E., Petrov, V.S., Tebekin, A.V., and Tebekin, P.A., Upravlenie innovatsiyami (Management of Innovations), Tebekin, A.V., Ed., Moscow: Rossiiskaya Tamozhennaya Akademiya, 2017."},{"key":"7646_CR8","doi-asserted-by":"crossref","unstructured":"Anisimov, E.G., Anisimov, V.G., Blau, S.L., and Novikov, V.E., and Tebekin, A.V., Decision-making support model at formation of innovation strategy of an enterprise, Ekon. Sel\u2019skogo Khozyaistva Ross., 2016, no. 3, pp.\u00a053\u201359.","DOI":"10.32651\/2070-0288-2016-3-53-59"},{"key":"7646_CR9","unstructured":"Anisimov, V.G., Anisimov, E.G., and Bosov, D.B., Matematicheskie modeli i metody upravleniya innovatsionnymi proektami (Mathematical Models and Methods for Management of Innovation Projects), Moscow: Aegis-Print, 2009."},{"key":"7646_CR10","unstructured":"Anisimov, V.G., Anisimov, E.G., Chernysh, A.Ya., and Chechevatov, A.V., Optimizatsionnye modeli i metody v upravlenii innovatsionnymi protsessami (Optimization Models and Methods in Management of Innovation Processes), Moscow: Ross. Tamozhennaya Akad., 2006."},{"key":"7646_CR11","unstructured":"Anisimov, V.G., Anisimov, E.G., Antsigin, A.V., Borisov, A.M., Kezhaev, V.A., and Svertilov, N.I., Metody i modeli optimizatsii v upravlenii razvitiem slozhnykh tekhnicheskikh sistem (Optimization Methods and Models in Management of Development of Complex Engineering Systems), St. Petersburg: Politekhnika, 2004."},{"key":"7646_CR12","unstructured":"Anisimov, V.G. and Anisimov, E.G., Formal structure of standardization and unification problems in management of development of complex engineering systems, Zashch. Bezop., 2004, no. 4, pp. 26\u201331."},{"key":"7646_CR13","unstructured":"Anisimov, V.G., Anisimov, E.G., Novikov, V.E., and Ostanin, V.A., Modeling optimization tasks to support decision-making process in innovation management, Vestn. Ross. Tamozhennoi Akad., 2016, no. 1, pp. 90\u201398."},{"key":"7646_CR14","first-page":"31","volume":"5","author":"A.V. Tebekin","year":"2019","unstructured":"Tebekin, A.V., Saurenko, T.N., Anisimov, V.G., and Anisimov, E.G., Model of forecasting the cost and timing of the modernization of industrial enterprises, Zh. Issled. Upravleniyu, 2019, vol. 5, no. 3, pp. 31\u201337.","journal-title":"Zh. Issled. Upravleniyu"},{"key":"7646_CR15","unstructured":"Vedernikov, Yu.V., Gar\u2019kushev, A.Yu., Anisimov, V.G., Anisimov, E.G., and Sazykin, A.M., Models and algorithms of intellectualization of automated management by diversification of activity of the industrial enterprise, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistviya Terrorizmu, 2014, nos. 5\u20136, pp. 61\u201372."},{"key":"7646_CR16","unstructured":"Avdeev, M.M., Anisimov, V.G., Anisimov, E.G., Martyshchenko, L.A., and Shatokhin, D.V., Informatsionno-statisticheskie metody v upravlenii mikroekonomicheskimi sistemami (Information-Statistical Methods in Management of Microeconomic Systems), Tula: Grif i K, 2001."},{"key":"7646_CR17","unstructured":"Anisimov, V.G., Anisimov, E.G., Martyshchenko, L.A., and Shatokhin, D.V., Metody operativnogo statisticheskogo analiza rezul\u2019tatov vyborochnogo kontrolya kachestva promyshlennoi produktsii (Methods of Real-Time Statistical Analysis of the Results of Sample Quality Inspection of Industrial Products), Tula: Grif i K, 2001."},{"key":"7646_CR18","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3103\/s0146411616080289","volume":"50","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717\u2013721. https:\/\/doi.org\/10.3103\/s0146411616080289","journal-title":"Autom. Control Comput. Sci."},{"key":"7646_CR19","unstructured":"Anisimov, E.G., Anisimov, V.G., Bogoeva, E.M., Gar\u2019kushev, A.Yu., and Sazykin, A.M., Bases of creation of models of intellectualization in safety systems, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistviya Terrorizmu, 2014, nos. 9\u201310, pp. 22\u201327."},{"key":"7646_CR20","doi-asserted-by":"publisher","unstructured":"Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Zotova, E.A., Models of forecasting destructive influence risks for information processes in management systems, Inf.-Upr. Sist., 2019, no. 5, pp. 18\u201323. https:\/\/doi.org\/10.31799\/1684-8853-2019-5-18-23","DOI":"10.31799\/1684-8853-2019-5-18-23"},{"key":"7646_CR21","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.3103\/S0146411619080054","volume":"53","author":"V.G. Anisimov","year":"2019","unstructured":"Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., Saurenko, T.N., and Kasatkin, V.V., Model and method for optimizing computational processes in parallel computing systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1038\u20131044. https:\/\/doi.org\/10.3103\/S0146411619080054","journal-title":"Autom. Control Comput. Sci."},{"key":"7646_CR22","doi-asserted-by":"crossref","unstructured":"Balyasnikov, V.V., Vedernikov, Yu.V., Anisimov, V.G., and Anisimov, E.G., Model of the causal analysis on the basis of use of special situations\u2019s data, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistviya Terrorizmu, 2015, nos. 1\u20132, pp. 31\u201338.","DOI":"10.2174\/1389450116666150304102858"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080357.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080357","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080357.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:12Z","timestamp":1773612192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7646"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080357","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"19 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}