{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:59Z","timestamp":1773615659078,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700998","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:15Z","timestamp":1741962195000},"page":"1326-1335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept"],"prefix":"10.3103","volume":"58","author":[{"given":"A. A.","family":"Kornienko","sequence":"first","affiliation":[]},{"given":"S. V.","family":"Kornienko","sequence":"additional","affiliation":[]},{"given":"N. S.","family":"Razzhivin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7798_CR1","unstructured":"BYOD policy. https:\/\/encyclopedia.kaspersky.ru\/glossary\/byod\/. Cited September 24, 2023."},{"key":"7798_CR2","unstructured":"Krotova, E.L., Andreev, R.A., Badrtdinov, A.S., and Feofilova, P.A., The BYOD concept review, Tekhnicheskie Nauki\u2014Ot Teorii k Praktike, 2015, nos. 7\u20138, pp. 12\u201317."},{"key":"7798_CR3","unstructured":"What is BYOD? BYOD models and its concept, . https:\/\/ipvs.ru\/news\/chto_takoe_byod_modeli_byod\/. Cited September 24, 2023."},{"key":"7798_CR4","unstructured":"Brodin, M., BYOD vs. CYOD\u2014What is the difference?. https:\/\/www.researchgate.net\/publication\/301296472_ BYOD_VS_CYOD_-_WHAT_IS_THE_DIFFERENCE\/citation\/download."},{"key":"7798_CR5","unstructured":"Krylov, A., Approaches to provision of security in the BYOD concept. https:\/\/www.anti-malware.ru\/analytics\/Technology_Analysis\/BYOD_Security#tasks_review. Cited September 24, 2023."},{"key":"7798_CR6","unstructured":"Piskunov, I., The BYOD security concept in an enterprise environement. https:\/\/ipiskunov.blogspot.com\/ 2016\/07\/byod.html. Cited September 24, 2023."},{"key":"7798_CR7","unstructured":"Titov, E., Protection of mobile devices, the BYOD, CYOD, COPE concept. https:\/\/www.securitylab.ru\/blog\/company\/axxtel\/348911.php. Cited September 24, 2023."},{"key":"7798_CR8","unstructured":"Smirnov, P.V. and Stoichin, K.L., Problemy informatsionnoi bezopasnosti pri ispol\u2019zovanii kontseptsii BYOD, Bezopasnost\u2019 informatsionnogo prostranstva-2017: XVI Vserossiiskaya nauchno-prakticheskaya konferentsiya studentov, aspirantov, molodykh uchenykh (Security of Information Space-2017: 16th All-Russian Scientific and Practical Conference of Students, Postgraduates, Young Scientists), Yekaterinburg, 2018, Yekaterinburg: Izd-vo Ural. Univ, 2018, pp. 129\u2013132."},{"key":"7798_CR9","unstructured":"Alivev, R.A. and Spiridonov, A.Yu., Analysis of information security of mobile devices, Perspektivy razvitiya informatsionnykh tekhnologii: sbornik materialov XX Mezhdunarodnoi nauchno-prakticheskoi konferentsii, 26 sentyabrya 2014 g. (Prospects of Development of Information Technologies: Proceedings of the 20th International Scientific and Practical Conference, September 26, 2014), Novosibirsk, 2014, Novosibirsk: Tsentr Razvitiya Nauchnogo Sotrudnichestva, 2014, pp. 137\u2013143."},{"key":"7798_CR10","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., A universal method for detecting cyberattacks on global information systems supporting the digital economy, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2019, no. 28, pp. 48\u201349."},{"key":"7798_CR11","doi-asserted-by":"publisher","first-page":"867","DOI":"10.3103\/s0146411617080156","volume":"51","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Application of clustering methods for analyzing the security of Android applications, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 867\u2013873. https:\/\/doi.org\/10.3103\/s0146411617080156","journal-title":"Autom. Control Comput. Sci."},{"key":"7798_CR12","unstructured":"A method for assessing the information security threats. https:\/\/fstec.ru\/dokumenty\/vse-dokumenty\/spetsialnye-normativnye-dokumenty\/metodicheskij-dokument-ot-5-fevralya-2021-g. Cited April 18, 2023."},{"key":"7798_CR13","unstructured":"Vakhonin, S.L., Virtual DLP technology for protection of corporate data in the BYOD strategy, 2014. https:\/\/www.anti-malware.ru\/analytics\/technology_analysis\/Virtual_DLP_technology_for_BYOD. Cited September 24, 2023."},{"key":"7798_CR14","unstructured":"Yuming, I., Zhenjiang, D., Da, L., and Wei, W., The terminal layer provides a BYOD security set, ZTE Technology Journal, 2013, no. 6, pp. 33\u201338, 42."},{"key":"7798_CR15","doi-asserted-by":"publisher","first-page":"963","DOI":"10.3103\/s0146411619080108","volume":"53","author":"D.V. Ivanov","year":"2019","unstructured":"Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Detection of security threats to modern websites, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 963\u2013968. https:\/\/doi.org\/10.3103\/s0146411619080108","journal-title":"Autom. Control Comput. Sci."},{"key":"7798_CR16","unstructured":"Kotenko, I.V., Saenko, I.B., and Yusupov, R.M., New generation of security information and event management systems, Nauchno-Tekhnicheskie Vedomosti Sankt-Peterburgskogo Gosudarstvennogo Politekhnicheskogo Universiteta. Informatika. Telekommunikatsii. Upravlenie, 2014, no. 3, pp. 7\u201318."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700998.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700998","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700998.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:55Z","timestamp":1773612175000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7798"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700998","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"27 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}