{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:48Z","timestamp":1773615708038,"version":"3.50.1"},"reference-count":7,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s014641162470072x","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:59Z","timestamp":1741962179000},"page":"1108-1113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes"],"prefix":"10.3103","volume":"58","author":[{"given":"S. V.","family":"Bezzateev","sequence":"first","affiliation":[]},{"given":"V. A.","family":"Mylnikov","sequence":"additional","affiliation":[]},{"given":"A. R.","family":"Starodub","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7771_CR1","unstructured":"Indicator of compromise. https:\/\/encyclopedia.kaspersky.ru\/glossary\/indicator-of-compromise-ioc. Cited January 12, 2023."},{"key":"7771_CR2","unstructured":"Django MVT Architecture. https:\/\/www.askpython.com\/django\/django-mvt-architecture. Cited March 30, 2023."},{"key":"7771_CR3","volume-title":"Scoring model for IoCs by combining open intelligence feeds to reduce false positives, Security and Network Engineering","author":"J. Ermerins","year":"2020","unstructured":"Ermerins, J., Van Noort, N., De Novais Marques, J., and Velasco, L., Scoring model for IoCs by combining open intelligence feeds to reduce false positives, Security and Network Engineering, Amsterdam: University of Amsterdam, 2020, pp. 1\u201320."},{"key":"7771_CR4","doi-asserted-by":"publisher","unstructured":"Iklody, A., Wagener, G., Dulaunoy, A., Mokaddem, S., and Wagner, C., Decaying indicators of compromise, arXiv Preprint, 2018. https:\/\/doi.org\/10.48550\/arXiv.1803.11052","DOI":"10.48550\/arXiv.1803.11052"},{"key":"7771_CR5","doi-asserted-by":"publisher","unstructured":"Mokaddem, S., Wagener, G., Dulaunoy, A., and Iklody, A., Taxonomy driven indicator scoring in misp threat intelligence platforms, arXiv Preprint, 2019. https:\/\/doi.org\/10.48550\/arXiv.1902.03914","DOI":"10.48550\/arXiv.1902.03914"},{"key":"7771_CR6","first-page":"91","volume":"2020","author":"T.N. Yelina","year":"2020","unstructured":"Yelina, T.N., Mylnikov, V.A., and Bezzateev, S.V., Optimal allocation of cloud service resources using multi-agent technologies, 2020 Wave Electronics and Its Application in Information and Telecommunication Systems, \n               WECONF \n               2020, 2020, p. 91.","journal-title":"WECONF"},{"key":"7771_CR7","unstructured":"Bezzateev, S.V., Elina, T.N., and Krasnikov, N.S., Exploring machine learning methods for information security in retail operations, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2022, no. 3, pp. 155\u2013166."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162470072X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162470072X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162470072X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:33Z","timestamp":1773612213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162470072X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7771"],"URL":"https:\/\/doi.org\/10.3103\/s014641162470072x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"21 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}