{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:19Z","timestamp":1773615859900,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700883","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:42Z","timestamp":1741962162000},"page":"1242-1249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects"],"prefix":"10.3103","volume":"58","author":[{"given":"A. F.","family":"Suprun","sequence":"first","affiliation":[]},{"given":"A. Yu.","family":"Garkushev","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Vyvolokina","sequence":"additional","affiliation":[]},{"given":"S. I.","family":"Fokina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7787_CR1","unstructured":"Solodyannikov, A.V., Vasil\u2019eva, I.N., Andreevskii, I.L., et al., Problemy informatsionnoi bezopasnosti v kiberprostranstve. Monografiya (Problems of Information Security in Cyberspace: A Monograph), St. Petersburg: Sankt-Peterburgskii Gosudarstvennyi Ekonomicheskii Universitet, 2024."},{"key":"7787_CR2","doi-asserted-by":"publisher","first-page":"927","DOI":"10.3103\/s0146411622080089","volume":"56","author":"V.M. Krundyshev","year":"2022","unstructured":"Krundyshev, V.M. and Kalinin, M.O., Mathematical model of the spread of computer attacks on critical information infrastructure, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 927\u2013933. https:\/\/doi.org\/10.3103\/s0146411622080089","journal-title":"Autom. Control Comput. Sci."},{"key":"7787_CR3","doi-asserted-by":"publisher","first-page":"679","DOI":"10.3103\/s0146411615080088","volume":"49","author":"A.S. Konoplev","year":"2015","unstructured":"Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679\u2013683. https:\/\/doi.org\/10.3103\/s0146411615080088","journal-title":"Autom. Control Comput. Sci."},{"key":"7787_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.24411\/2072-8735-2018-10323","volume":"13","author":"N.A. Kuznetsov","year":"2019","unstructured":"Kuznetsov, N.A. and Kuznetsov, N.A., Simulation of queuing system with multiplication of requests in queues, T-Comm: Telekommunikatsii i Transport, 2019, vol. 13, no. 11, pp. 32\u201337. https:\/\/doi.org\/10.24411\/2072-8735-2018-10323","journal-title":"T-Comm: Telekommunikatsii i Transport"},{"key":"7787_CR5","doi-asserted-by":"publisher","unstructured":"Ternovskii, D.S. and Tarasova, EE an. Shevtsova., N.V., Organizations\u2019 crisis situation modeling on the basis of logistic regression with the application of Harington\u2019s function, Sovremennaya Ekonomika: Problemy i Resheniya, 2015, no. 4, pp. 18\u201325. https:\/\/doi.org\/10.17308\/meps.2015.4\/1211","DOI":"10.17308\/meps.2015.4\/1211"},{"key":"7787_CR6","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411621080198","volume":"55","author":"I.I. Marshev","year":"2021","unstructured":"Marshev, I.I., Zhukovskii, E.V., and Aleksandrova, E.B., Protection against adversarial attacks on malware detectors using machine learning algorithms, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1025\u20131028. https:\/\/doi.org\/10.3103\/s0146411621080198","journal-title":"Autom. Control Comput. Sci."},{"key":"7787_CR7","doi-asserted-by":"publisher","first-page":"865","DOI":"10.3103\/s0146411619080224","volume":"53","author":"I.D. Pankov","year":"2019","unstructured":"Pankov, I.D., Konoplev, A.S., and Chernov, A.Yu., Analysis of the security of UEFI BIOS embedded software in modern Intel-based computers, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 865\u2013869. https:\/\/doi.org\/10.3103\/s0146411619080224","journal-title":"Autom. Control Comput. Sci."},{"key":"7787_CR8","unstructured":"Vedernikov, Yu.V., Garkushev, A.Yu., Karpova, I.L., and Suprun, A.F., Formalization of the problem of choosing a variant of structural construction of the information complex for managing a multilevel hierarchical system according to the criterion of information security, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2018, no. 3, pp. 78\u201382."},{"key":"7787_CR9","unstructured":"Vilkov, V.B., Chernykh, A.K., Garkushev, A.Yu., and Zaitsev, A.I., Algorithm of finding of the optimum route of promotion of division of troops of National Guard, Izvestiya Rossiiskoi Akademii Raketnykh i Artilleriiskikh Nauk, 2017, no. 1, pp. 29\u201333."},{"key":"7787_CR10","doi-asserted-by":"publisher","unstructured":"Garkushev, A.Yu., Suprun, A.F., and Sysuev, S.Yu., Procedure for integration of information protection modules into domestic automated design systems in shipbuilding, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2022, no. 1, pp. 121\u2013131. https:\/\/doi.org\/10.48612\/jisp\/5tuk-48fz-zmx5","DOI":"10.48612\/jisp\/5tuk-48fz-zmx5"},{"key":"7787_CR11","first-page":"909","volume":"68","author":"M. Kalinin","year":"2015","unstructured":"Kalinin, M., Lavrova, D., and Pechenkin, A., High performance traffic processing in virtualized framework, Proceedings of the Bulgarian Academy of Sciences, 2015, vol. 68, no. 7, pp. 909\u2013916.","journal-title":"Proceedings of the Bulgarian Academy of Sciences"},{"key":"7787_CR12","unstructured":"Vedernikov, Yu.V., Garkushev, A.Yu., Karpova, I.L., Prutkov, G.M., and Suprun, A.F., Normalization of diverse indicators of quality of the multilevel complex of management taking into account requirements of information security, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2018, no. 4, pp. 105\u2013113."},{"key":"7787_CR13","doi-asserted-by":"publisher","unstructured":"Garkushev, A.Yu., Lipis, A.V., Suprun, A.F., and Ivanova, L.A., Forming the culture of digital security of students of higher educational institutions of shipbuilding profile, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2023, no. 1, pp. 54\u201361. https:\/\/doi.org\/10.48612\/jisp\/pfap-9f4a-abmt","DOI":"10.48612\/jisp\/pfap-9f4a-abmt"},{"key":"7787_CR14","unstructured":"Andreev, V.P., Chernykh, A.K., Garkushev, A.Yu., and Prutkov, G.M., Information safety at emergency situations: Protection of personal computers against the unauthorized access, Voprosy Oboronnoi Tekhniki. Seriya 16: Tekhnicheskie Sredstva Protivodeistviya Terrorizmu, 2017, nos. 11\u201312, pp. 109\u2013114."},{"key":"7787_CR15","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web of Conferences, 2018, vol. 44, p. 00044. https:\/\/doi.org\/10.1051\/shsconf\/20184400044","DOI":"10.1051\/shsconf\/20184400044"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700883.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700883","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700883.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:42Z","timestamp":1773612342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7787"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700883","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"23 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}