{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:50Z","timestamp":1773615590060,"version":"3.50.1"},"reference-count":19,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700725","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:30:59Z","timestamp":1771936259000},"page":"1209-1216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Predictive Analysis of Information Flows in Information Security Systems of Telecommunication Complexes"],"prefix":"10.3103","volume":"59","author":[{"given":"V. L.","family":"Gorbunov","sequence":"first","affiliation":[]},{"given":"A. I.","family":"Faizullina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7907_CR1","unstructured":"Nenadovich, D.M., Methods of fuzzy-set theory in information security quality characteristics reduction problems of telecommunication systems, Nauchnyi Vestnik Moskovskogo Gosudarstvennogo Tekhnicheskogo Universiteta Grazhdanskoi Aviatsii, 2005, no. 93, pp. 53\u201360."},{"key":"7907_CR2","unstructured":"Ivanov, S.V., Cyber threats in telecommunication networks: Analysis and protection methods, Zhurnal Informatsionnykh Tekhnologii, 2019, no. 6, pp. 42\u201358."},{"key":"7907_CR3","unstructured":"Petrushin, A.S., To a question on information safety in telecommunication networks, Nauchnyi vestnik Moskovskogo Gosudarstvennogo Tekhnicheskogo Universiteta Grazhdanskoi Aviatsii, 2010, no. 152."},{"key":"7907_CR4","unstructured":"Gagarina, L.G., Teplova, Ya.O., Rumyantseva, E.L., and Bain, A.M., Informatsionnye sistemy i tekhnologii (Information Systems and Technologies), Moscow: Moskovskii Institut Elektronnoi Tekhniki, 2023."},{"key":"7907_CR5","first-page":"437","volume":"2","author":"A.P. Yudin","year":"2023","unstructured":"Yudin, A.P., Problems of information security of facility\u2019s telecommunication technologies, Vestnik Nauki, 2023, vol. 2, no. 5, pp. 437\u2013443.","journal-title":"Vestnik Nauki"},{"key":"7907_CR6","unstructured":"Current cyber threats: First quarter of 2023. https:\/\/www.ptsecurity.com\/ru-ru\/research\/analytics\/cybersecurity-threatscape-2023-q1\/. Cited November 1, 2024."},{"key":"7907_CR7","unstructured":"Examples of using the OSI model. https:\/\/sky.pro\/wiki\/sql\/primery-ispolzovaniya-modeli-osi\/. Cited October 25, 2024."},{"key":"7907_CR8","unstructured":"How antivirus works and which one of all is best for the user to install. https:\/\/www.roksis.ru\/articles\/kak-rabotaet-antivirus\/. Cited November 4, 2024."},{"key":"7907_CR9","unstructured":"Development of information threats in the first quarter of 2023. PC statistics. https:\/\/securelist.ru\/it-threat-evolution-q1-2023-pc-statistics\/107526\/. Cited November 4, 2024."},{"key":"7907_CR10","unstructured":"Tadviser. https:\/\/www.tadviser.ru\/index.php\/. Cited October 25, 2024."},{"key":"7907_CR11","unstructured":"Analysis of the wannacry malware. https:\/\/kasersky.ru. Cited November 4, 2024."},{"key":"7907_CR12","unstructured":"Petya scare virus epidemic: What you need to know. https:\/\/habr.com\/ru\/companies\/varonis\/articles\/337186\/. Cited November 4, 2024."},{"key":"7907_CR13","unstructured":"NotPetya is not a simple encryptor, but a tool of cyberwarfare. https:\/\/www.comss.ru\/page.php. Cited October 25, 2024."},{"key":"7907_CR14","unstructured":"Conficker worm: Treat and protect against Conficker virus that exploits a Windows vulnerability. https:\/\/www.introweb.ru\/inews\/chronicle\/news9475.php. Cited November 4, 2024."},{"key":"7907_CR15","unstructured":"Conficker worm. https:\/\/www.tadviser.ru\/index.php\/%d0%a1%d1%82%d0%b0%d1%82%d1%8c%d1%8f: %d0%a7%d0%b5%d1%80%d0%b2%d1%8c_Conficker. Cited November 4, 2024."},{"key":"7907_CR16","unstructured":"Computerra: Zeus: The virus that robs banks. https:\/\/old.computerra.ru\/vision\/554031\/. Cited November 4, 2024."},{"key":"7907_CR17","unstructured":"What is Emotet and how can you protect yourself from it?. https:\/\/y.ru\/resource-center\/threats\/emotet. Cited October 25, 2024."},{"key":"7907_CR18","unstructured":"How to detect and stop Emotet virus. https:\/\/habr.com\/ru\/companies\/varonis\/articles\/521786\/. Cited October 25, 2024."},{"key":"7907_CR19","unstructured":"The 10 most dangerous viruses of the new century. https:\/\/proglib.io\/p\/10-samyh-opasnyh-kompyuternyh-virusov-novogo-veka-2021-11-01. Cited November 4, 2024."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700725.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700725","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700725.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:57Z","timestamp":1773612117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700725"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7907"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700725","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"20 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}