Justification of the Rational Composition of the Information Security System
This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form...
Saved in:
| Published in: | Automatic control and computer sciences Vol. 58; no. 8; pp. 1093 - 1099 |
|---|---|
| Main Authors: | , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Moscow
Pleiades Publishing
01.12.2024
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0146-4116, 1558-108X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form of a discrete model of mathematical programming. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm is developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of methods for supporting decision-making in the substantiation of the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their operation. |
|---|---|
| AbstractList | This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form of a discrete model of mathematical programming. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm is developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of methods for supporting decision-making in the substantiation of the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their operation. |
| Author | Zegzhda, D. P. Anisimov, V. G. Suprun, A. F. Anisimov, E. D. |
| Author_xml | – sequence: 1 givenname: A. F. surname: Suprun fullname: Suprun, A. F. email: suprun_af@spbstu.ru organization: Peter the Great St. Petersburg Polytechnic University – sequence: 2 givenname: D. P. surname: Zegzhda fullname: Zegzhda, D. P. organization: Peter the Great St. Petersburg Polytechnic University – sequence: 3 givenname: V. G. surname: Anisimov fullname: Anisimov, V. G. organization: Peter the Great St. Petersburg Polytechnic University – sequence: 4 givenname: E. D. surname: Anisimov fullname: Anisimov, E. D. organization: Peoples’ Friendship University of Russia |
| BookMark | eNp1kEtLxDAUhYOM4MzoD3BXcF3Ne5KlDD5GBgSr4K6kaaIdpk1N0sX8e1MrKIirey_fOZfDWYBZ5zoDwDmClwRBclVARDlFiGO6gnAF-RGYI8ZEjqB4nYH5iPORn4BFCDsIExN8DrYPQ4iNbbSKjesyZ7P4brKnr0vts7Vrexea32zTWefbSV4YPfgmHrLiEKJpT8GxVftgzr7nErzc3jyv7_Pt491mfb3NNZIi5khQK5WWDNeW8goJVTFISC0rRTira80wlzaFpZoRXHGsrIScVWmXmEBFluBi-tt79zGYEMudG3zKG0qCGRUUcSGSCk0q7V0I3tiy902r_KFEsBxLK_-Uljx48oSk7d6M__n8v-kTiYpvTQ |
| Cites_doi | 10.3390/sym14102208 10.3103/s0146411623080357 10.3103/s014641162108040x 10.3390/machines9040078 10.3103/s014641162008012x 10.3103/s014641161908025x 10.3103/s0146411618080035 10.3103/s0146411620080362 10.1145/3136825.3136890 10.3103/s0146411620080295 10.3390/s23218724 10.3103/s0146411617080053 10.31799/1684-8853-2019-5-18-23 10.53816/23061456_2022_9-10_13 10.3103/s0146411620080374 10.1145/1854099.1854125 |
| ContentType | Journal Article |
| Copyright | Allerton Press, Inc. 2024 ISSN 0146-4116, Automatic Control and Computer Sciences, 2024, Vol. 58, No. 8, pp. 1093–1099. © Allerton Press, Inc., 2024.Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy, 2023, No. 4(57), pp. 9–18. Allerton Press, Inc. 2024. |
| Copyright_xml | – notice: Allerton Press, Inc. 2024 ISSN 0146-4116, Automatic Control and Computer Sciences, 2024, Vol. 58, No. 8, pp. 1093–1099. © Allerton Press, Inc., 2024.Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy, 2023, No. 4(57), pp. 9–18. – notice: Allerton Press, Inc. 2024. |
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS |
| DOI | 10.3103/S0146411624700706 |
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1558-108X |
| EndPage | 1099 |
| ExternalDocumentID | 10_3103_S0146411624700706 |
| GroupedDBID | -Y2 -~X .86 .VR 06D 0R~ 0VY 1N0 23N 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 4.4 408 40D 40E 5GY 5VS 6NX 8TC 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABDBE ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACCUX ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADKNI ADRFC ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AETLH AEVLU AEXYK AFBBN AFFNX AFGCZ AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AI. AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG COF CS3 DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ7 H13 HF~ HG6 HLICF HMJXF HRMNR HZ~ IJ- IKXTQ IWAJR I~X I~Z J-C JBSCW JZLTJ KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J P9O PF0 PT4 QOS R89 R9I RNS ROL RPX RSV S16 S1Z S27 S3B SAP SCO SDH SHX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TN5 TSG TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW VH1 W48 WK8 YLTOR ZMTXR ~A9 AAYXX ABFSG ABJCF ABRTQ ACSTC AEZWR AFDZB AFFHD AFHIU AFKRA AFOHR AHPBZ AHWEU AIXLP ARAPS ATHPR BENPR BGLVJ CCPQU CITATION HCIFZ K7- M7S PHGZM PHGZT PQGLB PTHSS 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c198t-184f9ac952df46b18ab5033d9ba365ddc5269f4114c532b62af9065b32b9230a3 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001444845400034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0146-4116 |
| IngestDate | Tue Dec 02 09:52:30 EST 2025 Sat Nov 29 08:07:26 EST 2025 Sat Mar 15 01:10:33 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Keywords | corporate computer network information security system model for forming the system composition algorithm |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c198t-184f9ac952df46b18ab5033d9ba365ddc5269f4114c532b62af9065b32b9230a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 3254841688 |
| PQPubID | 2043879 |
| PageCount | 7 |
| ParticipantIDs | proquest_journals_3254841688 crossref_primary_10_3103_S0146411624700706 springer_journals_10_3103_S0146411624700706 |
| PublicationCentury | 2000 |
| PublicationDate | 20241200 2024-12-00 20241201 |
| PublicationDateYYYYMMDD | 2024-12-01 |
| PublicationDate_xml | – month: 12 year: 2024 text: 20241200 |
| PublicationDecade | 2020 |
| PublicationPlace | Moscow |
| PublicationPlace_xml | – name: Moscow – name: New York |
| PublicationTitle | Automatic control and computer sciences |
| PublicationTitleAbbrev | Aut. Control Comp. Sci |
| PublicationYear | 2024 |
| Publisher | Pleiades Publishing Springer Nature B.V |
| Publisher_xml | – name: Pleiades Publishing – name: Springer Nature B.V |
| References | 7769_CR7 7769_CR3 7769_CR5 7769_CR6 7769_CR22 7769_CR21 7769_CR2 V.V. Platonov (7769_CR15) 2014; 17 7769_CR25 M.O. Kalinin (7769_CR18) 2021; 55 7769_CR23 E.A. Popova (7769_CR24) 2020; 54 7769_CR28 P.D. Zegzhda (7769_CR26) 2020; 54 7769_CR27 D.S. Lavrova (7769_CR11) 2014; 17 M.A. Poltavtseva (7769_CR1) 2019; 53 A.O. Alekseyev (7769_CR17) 1988; 26 P.D. Zegzhda (7769_CR16) 2020; 54 A.D. Fatin (7769_CR20) 2020; 54 V.G. Anisimov (7769_CR14) 2017; 51 M. Kalinin (7769_CR8) 2023; 23 V.G. Anisimov (7769_CR10) 2018; 52 7769_CR30 M. Kalinin (7769_CR4) 2021; 9 V.G. Anisimov (7769_CR29) 1997; 37 7769_CR19 T.N. Saurenko (7769_CR13) 2020; 9 D.P. Zegzhda (7769_CR12) 2023; 57 M. Kalinin (7769_CR9) 2022; 14 |
| References_xml | – volume: 14 start-page: 2208 year: 2022 ident: 7769_CR9 publication-title: Symmetry doi: 10.3390/sym14102208 – volume: 17 start-page: 263 year: 2014 ident: 7769_CR11 publication-title: Nonlinear Phenom. Complex Syst. – ident: 7769_CR3 – volume: 57 start-page: 881 year: 2023 ident: 7769_CR12 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s0146411623080357 – ident: 7769_CR25 – volume: 55 start-page: 1165 year: 2021 ident: 7769_CR18 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s014641162108040x – volume: 9 start-page: 78 year: 2021 ident: 7769_CR4 publication-title: Machines doi: 10.3390/machines9040078 – ident: 7769_CR7 – ident: 7769_CR21 – volume: 54 start-page: 983 year: 2020 ident: 7769_CR20 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s014641162008012x – ident: 7769_CR23 – volume: 53 start-page: 895 year: 2019 ident: 7769_CR1 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s014641161908025x – volume: 9 start-page: 6259 year: 2020 ident: 7769_CR13 publication-title: International Journal of Scientific and Technology Research – volume: 52 start-page: 1105 year: 2018 ident: 7769_CR10 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s0146411618080035 – volume: 54 start-page: 864 year: 2020 ident: 7769_CR16 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s0146411620080362 – ident: 7769_CR6 doi: 10.1145/3136825.3136890 – ident: 7769_CR28 – volume: 54 start-page: 907 year: 2020 ident: 7769_CR24 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s0146411620080295 – volume: 26 start-page: 130 year: 1988 ident: 7769_CR17 publication-title: Sov. J. Comput. Syst. Sci. – ident: 7769_CR22 – volume: 37 start-page: 175 year: 1997 ident: 7769_CR29 publication-title: Comput. Math. Math. Phys. – volume: 23 start-page: 8724 year: 2023 ident: 7769_CR8 publication-title: Sensors doi: 10.3390/s23218724 – volume: 17 start-page: 284 year: 2014 ident: 7769_CR15 publication-title: Nonlinear Phenom. Complex Syst. – volume: 51 start-page: 824 year: 2017 ident: 7769_CR14 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s0146411617080053 – ident: 7769_CR5 doi: 10.31799/1684-8853-2019-5-18-23 – ident: 7769_CR19 – ident: 7769_CR27 doi: 10.53816/23061456_2022_9-10_13 – ident: 7769_CR30 – volume: 54 start-page: 930 year: 2020 ident: 7769_CR26 publication-title: Autom. Control Comput. Sci. doi: 10.3103/s0146411620080374 – ident: 7769_CR2 doi: 10.1145/1854099.1854125 |
| SSID | ssj0055886 |
| Score | 2.294226 |
| Snippet | This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 1093 |
| SubjectTerms | Algorithms Composition Computer networks Computer Science Control Structures and Microprogramming Cybersecurity Decision making Mathematical programming Security systems Variables |
| SummonAdditionalLinks | – databaseName: Engineering Database dbid: M7S link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BYYCBN6JQUAYmUNTasZN4QghRMVQVooC6RXEcSyxNaQu_nzvHUXkIFrbIlqzofD7fy98HcM5yrqzp0fMzG4WC6yhUiZGoyz0tJSqAdKmB50EyHKbjsbr3Cbe5b6tsbKIz1KYqKEfejTCSoRJZml5NX0NijaLqqqfQWIU1QklgrnVv1FhiKVPH9Ej4KKFgLK6rmsSs1aWmppjGuEgI8ib-ei8tnc1v9VF37fS3__vDO7DlHc7gutaQXVgpJ3uw-QmGcB8GjtLL-uxdUNkAvcLgwacJAzIZvrWrmfOPmNzQyDPgBTX4-QE89W8fb-5Cz7IQFkylixBDPKvyQklurIg1S3NNpU2jdB7F0piCOMgtikoUMuI65rlV6Ldo_EbnsJdHh9CaVJPyCAKUeK4jbVOM0oTG4Ncww4U1FqWQsFK04aKRcTatwTQyDEJoQ7IfG9KGTiPXzJ-rebYUahsum51ZTv-62PHfi53ABkdnpW5T6UBrMXsrT2G9eF-8zGdnTqk-ACZCz4Y priority: 102 providerName: ProQuest |
| Title | Justification of the Rational Composition of the Information Security System |
| URI | https://link.springer.com/article/10.3103/S0146411624700706 https://www.proquest.com/docview/3254841688 |
| Volume | 58 |
| WOSCitedRecordID | wos001444845400034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: P5Z dateStart: 20230201 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: K7- dateStart: 20230201 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: M7S dateStart: 20230201 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1558-108X dateEnd: 20241209 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: BENPR dateStart: 20230201 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1558-108X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0055886 issn: 0146-4116 databaseCode: RSV dateStart: 20070201 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PT8IwFH4R8KAHUdSI4rKDJ83itrZbe1QjMZEQAkqIl2VdaeIFDKB_v69dF_x50MuyrF3Tvb227-t7fR_AWZTHQqvQHD_TJKCxJIFIFUNdDiVjqADMbg2Me2m_zycTMXDnuJdVtHvlkrQztcWVIbk0YUgJjaIkpqlJUpPUoIGrHTd8DcPRuJp-GeOW3tHUDkz10pX5cxOfF6O1hfnFKWrXmm7zX73chR1nWvpXpS7swcZ01oJmRdvgu1Hcgu0POQj3oWf5vLTbuvPn2keT0B-6PULfvO7iuqoyd4LJPho5-ju_zHx-AI_d24ebu8BRLARFJPgqQHynRV4IFitNExnxXBq_phIyJwlTqjAE5Bq_hxaMxDKJcy3QaJF4j5ZhmJNDqM_ms-kR-Cj5XBKpOUI0KhH5qkjFVCsdJQjKprQN55Wss5cyk0aGCMRILfsmtTZ0qr-RuUG1zAiCWeMl5bwNF5X018W_Nnb8p9onsBWj4VKGrHSgvlq8Tk9hs3hbPS8XHjSub_uDoQe1-zTwTKToCK8D9uRZLXwHGrbOsw |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LSwMxEB5qFdSDb7FaNQe9KEu7yWYfBxFRS0trEa3S27rZbMBLW9uq-Kf8jU52N9QHeuvB25LAwGa-TGYyk_kADuyIBkpW9fMzxSyHCmYFnuSI5argHAHA06uB-5bXbvvdbnBdgHfzFkaXVRqbmBpq2Y_1HXmFYSSjU2S-fzp4sjRrlM6uGgqNDBbN5O0VQ7bRSeMC9XtIae2yc163clYBK8YAe2xhSKOCKA44lcpxhe1HQqfyZCAi5nIpY825rRyME2LOqHBppAI8pwV-ozNUjRjKnYFZh_me3ldNzzKWn3M_ZZbU_VgsFOBmWVTN5FXRRVSuHqOOp1vsuF_PwYlz-y0fmx5zteX_tkArsJQ71OQs2wGrUEh6a7D4qc3iOrRSyjKV306SviLo9ZKb_BqUaJOYl66ZufyRVjp0mzP8kay5-wbcTeV3NqHY6_eSLSCo4UgwoXyMQh2Bwb20JXWUVLjqnp04JTgyOg0HWbOQEIMsDYDwBwBKUDZ6DHO7MQonSizBsUHCZPpXYdt_C9uH-XrnqhW2Gu3mDixQdMyykpwyFMfD52QX5uKX8eNouJcCmsDDtAHyAcG1KrI |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFH_oFNGD06k4nZqDJ6WszUfXHEUdimMMp2O30jQNeOnGWv37TdqE-XkQb6VJQ5v30rxf3scP4DxIMFfSN-lningUC-LxnmRal33BmFYAVh0NTAa94TCaTvnI8pwWLtrduSTrnAZTpSkvu3OpuhXG9EnXhCSFNAhCTHumYE24CmvUxNEbuD6euF8xY1FF9Wh6e6Z77db8eYjPG9PS2vziIK32nX7z32-8A9vW5ERXtY7swkqWt6Dp6ByQXd0t2PpQm3APBhXPl7JHemimkDYV0aM9O0TmcRvv5dpsZlN1a2xp8VBdEX0fnvu3T9d3nqVe8NKAR6WncZ_iScoZloqGIogSYfydkouEhEzK1BCTK_09NGUEixAnimtjRuhrbTH6CTmARj7Ls0NAWgqJIEJFGrpRoRGxDCSmSqog1GAto224cPMez-sKG7FGJmbW4m-z1oaOk0xsF1sREw1yjfc0itpw6SSxbP51sKM_9T6DjdFNPx7cDx-OYRNr26aOaulAo1y8Ziewnr6VL8XitFLBd4pg1hk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Justification+of+the+Rational+Composition+of+the+Information+Security+System&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Suprun%2C+A.+F.&rft.au=Zegzhda%2C+D.+P.&rft.au=Anisimov%2C+V.+G.&rft.au=Anisimov%2C+E.+D.&rft.date=2024-12-01&rft.pub=Pleiades+Publishing&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=58&rft.issue=8&rft.spage=1093&rft.epage=1099&rft_id=info:doi/10.3103%2FS0146411624700706&rft.externalDocID=10_3103_S0146411624700706 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon |