{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:08Z","timestamp":1773615608242,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701220","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:41Z","timestamp":1741962161000},"page":"1429-1435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Assessment of the Competence of an Intelligent Information Security Management System"],"prefix":"10.3103","volume":"58","author":[{"given":"A. F.","family":"Suprun","sequence":"first","affiliation":[]},{"given":"A. Yu.","family":"Gar\u2019kushev","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Lipis","sequence":"additional","affiliation":[]},{"given":"I. L.","family":"Karpova","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Shalkovskaya","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7809_CR1","unstructured":"Gar\u2019kushev, A.Yu., Ivanova, D.D., Vedernikova, V.M., and Prutkov, G.M., Adaptive distribution of discrete resources in the conduct of private military companies, Voprosy Oboronnoi Tekhniki. Seriya 16: Tekhnicheskie Sredstva Protivodeistviya Terrorizmu, 2018, nos. 5\u20136, pp. 11\u201316."},{"key":"7809_CR2","unstructured":"Vilkov, V.B., Chernykh, A.K., Gar\u2019kushev, A.Yu., and Sazykin, A.M., Assessment of quality of decisions on application of spesial troops on the basis of multicriteria optimization, Voprosy Oboronnoi Tekhniki. Seriya 16: Tekhnicheskie Sredstva Protivodeistviya Terrorizmu, 2016, nos. 1\u20132, pp. 43\u201350."},{"key":"7809_CR3","unstructured":"Kalinin, M.O., Experience in the application of software-configurable networks in solving information security problems in networks with variable infrastructure, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 24-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 24th Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2015, pp. 23\u201324."},{"key":"7809_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.26583\/bit.2021.1.04","volume":"28","author":"D.P. Zegzhda","year":"2021","unstructured":"Zegzhda, D.P. and Zhukov, I.Yu., Features of information security of computer systems, Bezopasnost\u2019 \n               Informatsionnykh Tekhnologii, 2021, vol. 28, no. 1, pp. 42\u201361. https:\/\/doi.org\/10.26583\/bit.2021.1.04","journal-title":"Informatsionnykh Tekhnologii"},{"key":"7809_CR5","volume-title":"Teoreticheskie osnovy upravleniya innovatsiyami (Theoretical Foundations of Innovation Management)","author":"V.G. Anisimov","year":"2016","unstructured":"Anisimov, V.G., Anisimov, E.G., Petrov, V.S., Rodionova, E.S., Saurenko, T.N., Tebekin, A.V., and Tebekin, P.A., Teoreticheskie osnovy upravleniya innovatsiyami (Theoretical Foundations of Innovation Management), Tebekin, A.V., Ed., St. Petersburg: Strategiya Budushchego, 2016."},{"key":"7809_CR6","unstructured":"Pavlov, A.N., Models and methods for planning the reconfiguration of complex objects with a reconfigurable structure, Extended Abstract of Doctoral (Eng.) Dissertation, St. Petersburg: St. Petersburg State University of Aerospace Instrumentation, 2014."},{"key":"7809_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.compenvurbsys.2014.07.006","volume":"48","author":"S. Bimonte","year":"2014","unstructured":"Bimonte, S., Boucelma, O., Machabert, O., and Sellami, S., A new spatial OLAP approach for the analysis of volunteered geographic information, Comput., Environ. Urban Syst., 2014, vol. 48, pp. 111\u2013123. https:\/\/doi.org\/10.1016\/j.compenvurbsys.2014.07.006","journal-title":"Comput., Environ. Urban Syst."},{"key":"7809_CR8","unstructured":"Pechenkin, A.I. and Zegzhda, D.P., Application of machine learning and intelligent analysis methods in information security tasks, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 24-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 24th Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2017, p. 48."},{"key":"7809_CR9","unstructured":"Anisimov, V.G., Anisimov, E.G., Gar\u2019kushev, A.Yu., and Protsenko, D.S., Model and method of optimization of the plan of preparation of space systems, Izvestiya Rossiiskoi Akademii Raketnykh i Artilleriiskikh Nauk, 2015, no. 4, pp. 34\u201339."},{"key":"7809_CR10","unstructured":"Anisimov, V.G., Anisimov, E.G., and Saurenko, T.N., A model for formation of optimal adaptive decisions in the planning of investment processes, Ekonomika i Predprinimatel\u2019stvo, 2013, no. 10, pp. 640\u2013642."},{"key":"7809_CR11","unstructured":"Ivanov, A.I., Malye vyborki, neiromorfnye vychisleniya. Bystrye algoritmy otsenki entropii Shennona\u2013Pirsona kvadratichnoi slozhnosti (Small Samples, Neuromorphic Computing: Fast Algorithms for Shannon\u2013Pearson Entropy Estimation of Quadratic Complexity), Penza: Penzenskii Gosudarstvennyi Universitet, 2023."},{"key":"7809_CR12","doi-asserted-by":"publisher","first-page":"822","DOI":"10.3103\/s014641162008026x","volume":"54","author":"E.Yu. Pavlenko","year":"2020","unstructured":"Pavlenko, E.Yu. and Stepanov, M.D., Countering cyberattacks against intelligent bioinspired systems based on FANET, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 822\u2013828. https:\/\/doi.org\/10.3103\/s014641162008026x","journal-title":"Autom. Control Comput. Sci."},{"key":"7809_CR13","unstructured":"Anisimov, V.G., Anisimov, E.G., Boiko, A.P., Kalinina, O.V., Karpov, V.A., and Lobas, E.V., Vvedenie v ekonomicheskii risk-menedzhment (Introduction to Economic Risk Management), Moscow: Rossiiskaya Tamozhennaya Akademiya, 2008."},{"key":"7809_CR14","unstructured":"Osipova, L.M. and Poltavtseva, M.A., Formalization of open source data to solve information security problems, Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii. Materialy 31-i nauchno-tekhnicheskoi konferentsii (Methods and Technical Means of Information Security: Proceedings of the 31th Scientific and Technical Conference), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2022, pp. 93\u201395."},{"key":"7809_CR15","doi-asserted-by":"publisher","first-page":"985","DOI":"10.3103\/s014641161708017x","volume":"51","author":"M.A. Poltavtseva","year":"2017","unstructured":"Poltavtseva, M.A. and Pechenkin, A.I., Intelligent data analysis in decision support systems for penetration tests, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 985\u2013991. https:\/\/doi.org\/10.3103\/s014641161708017x","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701220.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701220","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701220.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:11Z","timestamp":1773612131000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7809"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701220","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"11 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}