{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:05Z","timestamp":1773615785083,"version":"3.50.1"},"reference-count":27,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700809","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:03Z","timestamp":1741962183000},"page":"1169-1179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources"],"prefix":"10.3103","volume":"58","author":[{"given":"M. Yu.","family":"Fedosenko","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7779_CR1","unstructured":"Akhrameeva, K.A., Fedosenko, M.Y., Gerling, E.Yu., and Yurkin, D.V., Analysis of exchange facilities of hidden data by intruders in Internet by steganography methods, Telekommunikatsii, 2020, no. 8, pp. 14\u201320."},{"key":"7779_CR2","doi-asserted-by":"publisher","unstructured":"Fedosenko, M.Yu. and Bezzateev, S.V., Comparative analysis of the problems of the application of steganography methdos in the implementation of illegal actions and its role in digital forensics, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2023, no. 3, pp. 33\u201357. https:\/\/doi.org\/10.48612\/jisp\/hnud-f89z-8gx7","DOI":"10.48612\/jisp\/hnud-f89z-8gx7"},{"key":"7779_CR3","doi-asserted-by":"publisher","first-page":"735","DOI":"10.24411\/2658-4964-2020-1105","volume":"3","author":"K.A. Akhrameeva","year":"2020","unstructured":"Akhrameeva, K.A. and Fedosenko, M.Yu., Protection of information by methods of cryptography in modern Russia, StudNet, 2020, vol. 3, no. 9, pp. 735\u2013743. https:\/\/doi.org\/10.24411\/2658-4964-2020-1105","journal-title":"StudNet"},{"key":"7779_CR4","unstructured":"Fedosenko, M.Yu., Sociological study of the knowledge of graduates of educational institutions in the hidden data exchange on the Internet, Skif. Voprosy Studencheskoi Nauki, 2022, no. 1, pp. 287\u2013295."},{"key":"7779_CR5","doi-asserted-by":"publisher","unstructured":"Akhrameeva, K.A. and Fedosenko, M.Yu., Comparative analysis of the use of steganographic software for hidden data exchange on the Internet, Vestnik Sankt-Peterburgskogo Gosudarstvennogo Universiteta Tekhnologii i Dizaina. Seriya 1: Estestvennye i Tekhnicheskie Nauki, 2022, no. 1, pp. 37\u201343. https:\/\/doi.org\/10.46418\/2079-8199_2022_1_5","DOI":"10.46418\/2079-8199_2022_1_5"},{"key":"7779_CR6","first-page":"1129","volume":"5","author":"M.Yu. Fedosenko","year":"2022","unstructured":"Fedosenko, M.Yu. and Bocharov, M.V., Analysis of the information hiding algorithms used in modern steganographic software, StudNet, 2022, vol. 5, no. 2, pp. 1129\u20131142.","journal-title":"StudNet"},{"key":"7779_CR7","unstructured":"Information security threat databank. https:\/\/bdu.fstec.ru\/threat. Cited February 2, 2024."},{"key":"7779_CR8","unstructured":"Malyuk, A.A., Informatsionnaya bezopasnost\u2019. Kontseptual\u2019nye i metodologicheskie osnovy zashchity informatsii (Information Security: Conceptual and Methodological Foundations of Information Protection), Moscow: Goryachaya Liniya-Telekom, 2016."},{"key":"7779_CR9","unstructured":"UBI.111: Threat of data transmission through hidden channels. https:\/\/bdu.fstec.ru\/threat\/ubi.111. Cited February 2, 2024."},{"key":"7779_CR10","unstructured":"UBI.068: Threat of unauthorized\/incorrect use of an application\u2019s interface. https:\/\/bdu.fstec.ru\/threat\/ubi.068. Cited February 2, 2024."},{"key":"7779_CR11","unstructured":"UBI.069: Threat of unlawful acts in communication channels. https:\/\/bdu.fstec.ru\/threat\/ubi.069. Cited February 2, 2024."},{"key":"7779_CR12","unstructured":"UBI.088: Threat of unauthorized copying of protected information. https:\/\/bdu.fstec.ru\/threat\/ubi.088. Cited February 2, 2024."},{"key":"7779_CR13","unstructured":"UBI.130: Threat of content spoofing of network resources. https:\/\/bdu.fstec.ru\/threat\/ubi.130. Cited February 2, 2024."},{"key":"7779_CR14","unstructured":"UBI.145: Threat of missing software integrity checks. https:\/\/bdu.fstec.ru\/threat\/ubi.145. Cited February 15, 2024."},{"key":"7779_CR15","unstructured":"UBI.149: Threat of processing failure of specially modified files. https:\/\/bdu.fstec.ru\/threat\/ubi.149. Cited February 2, 2024."},{"key":"7779_CR16","unstructured":"UBI.162: Threat of data transmission via covert channels. https:\/\/bdu.fstec.ru\/threat\/ubi.162. Cited February 15, 2024."},{"key":"7779_CR17","unstructured":"UBI.170: Threat of unauthorized encryption of information. https:\/\/bdu.fstec.ru\/threat\/ubi.170. Cited February 15, 2024."},{"key":"7779_CR18","unstructured":"UBI.177: Threat of unauthorized data entry by an operator into a security-related system. https:\/\/bdu.fstec.ru\/threat\/ubi.177. Cited February 15, 2024."},{"key":"7779_CR19","unstructured":"UBI.179: Threat of unauthorized modification of protected information. https:\/\/bdu.fstec.ru\/threat\/ubi.179. Cited February 15, 2024."},{"key":"7779_CR20","unstructured":"UBI.188: Threat of software substitution. https:\/\/bdu.fstec.ru\/threat\/ubi.188. Cited February 15, 2024."},{"key":"7779_CR21","unstructured":"UBI.189: The threat of masking the actions of malicious code. https:\/\/bdu.fstec.ru\/threat\/ubi.189. Cited February 15, 2024."},{"key":"7779_CR22","unstructured":"UBI.191: Threat of introducing malicious code into software distribution. https:\/\/bdu.fstec.ru\/threat\/ubi.191. Cited February 15, 2024."},{"key":"7779_CR23","unstructured":"UBI.193: Threat of information leakage due to the use of traffic encryption algorithms by malicious software. https:\/\/bdu.fstec.ru\/threat\/ubi.193. Cited February 15, 2024."},{"key":"7779_CR24","unstructured":"Microsoft Security Assessment Tool 4.0. https:\/\/www.microsoft.com\/ru-ru\/download\/details.aspx?id=12273. Cited February 4, 2024."},{"key":"7779_CR25","unstructured":"Partyka, T.L. and Popov, I.I., Informatsionnaya bezopasnost\u2019 (Information Security), Moscow: Forum, 2016."},{"key":"7779_CR26","unstructured":"Information security risks. https:\/\/rt-solar.ru\/products\/solardozor\/blog\/3320\/?ysclid=lm6parb5ug278920368. Cited February 1, 2024."},{"key":"7779_CR27","unstructured":"Nikulina, T.V., Detecting malicious code in graphic files injected using steganography methods, Matritsa Nauchnogo Poznaniya, 2021, nos. 1\u20132, pp. 62\u201367."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700809.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700809","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700809.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:33Z","timestamp":1773612273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7779"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700809","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"9 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}