Justification of the Rational Composition of the Information Security System

This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Automatic control and computer sciences Ročník 58; číslo 8; s. 1093 - 1099
Hlavní autoři: Suprun, A. F., Zegzhda, D. P., Anisimov, V. G., Anisimov, E. D.
Médium: Journal Article
Jazyk:angličtina
Vydáno: Moscow Pleiades Publishing 01.12.2024
Springer Nature B.V
Témata:
ISSN:0146-4116, 1558-108X
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form of a discrete model of mathematical programming. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm is developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of methods for supporting decision-making in the substantiation of the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their operation.
AbstractList This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form of a discrete model of mathematical programming. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm is developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of methods for supporting decision-making in the substantiation of the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their operation.
Author Zegzhda, D. P.
Anisimov, V. G.
Suprun, A. F.
Anisimov, E. D.
Author_xml – sequence: 1
  givenname: A. F.
  surname: Suprun
  fullname: Suprun, A. F.
  email: suprun_af@spbstu.ru
  organization: Peter the Great St. Petersburg Polytechnic University
– sequence: 2
  givenname: D. P.
  surname: Zegzhda
  fullname: Zegzhda, D. P.
  organization: Peter the Great St. Petersburg Polytechnic University
– sequence: 3
  givenname: V. G.
  surname: Anisimov
  fullname: Anisimov, V. G.
  organization: Peter the Great St. Petersburg Polytechnic University
– sequence: 4
  givenname: E. D.
  surname: Anisimov
  fullname: Anisimov, E. D.
  organization: Peoples’ Friendship University of Russia
BookMark eNp1kEtLxDAUhYOM4MzoD3BXcF3Ne5KlDD5GBgSr4K6kaaIdpk1N0sX8e1MrKIirey_fOZfDWYBZ5zoDwDmClwRBclVARDlFiGO6gnAF-RGYI8ZEjqB4nYH5iPORn4BFCDsIExN8DrYPQ4iNbbSKjesyZ7P4brKnr0vts7Vrexea32zTWefbSV4YPfgmHrLiEKJpT8GxVftgzr7nErzc3jyv7_Pt491mfb3NNZIi5khQK5WWDNeW8goJVTFISC0rRTira80wlzaFpZoRXHGsrIScVWmXmEBFluBi-tt79zGYEMudG3zKG0qCGRUUcSGSCk0q7V0I3tiy902r_KFEsBxLK_-Uljx48oSk7d6M__n8v-kTiYpvTQ
Cites_doi 10.3390/sym14102208
10.3103/s0146411623080357
10.3103/s014641162108040x
10.3390/machines9040078
10.3103/s014641162008012x
10.3103/s014641161908025x
10.3103/s0146411618080035
10.3103/s0146411620080362
10.1145/3136825.3136890
10.3103/s0146411620080295
10.3390/s23218724
10.3103/s0146411617080053
10.31799/1684-8853-2019-5-18-23
10.53816/23061456_2022_9-10_13
10.3103/s0146411620080374
10.1145/1854099.1854125
ContentType Journal Article
Copyright Allerton Press, Inc. 2024 ISSN 0146-4116, Automatic Control and Computer Sciences, 2024, Vol. 58, No. 8, pp. 1093–1099. © Allerton Press, Inc., 2024.Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy, 2023, No. 4(57), pp. 9–18.
Allerton Press, Inc. 2024.
Copyright_xml – notice: Allerton Press, Inc. 2024 ISSN 0146-4116, Automatic Control and Computer Sciences, 2024, Vol. 58, No. 8, pp. 1093–1099. © Allerton Press, Inc., 2024.Russian Text © The Author(s), 2023, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy, 2023, No. 4(57), pp. 9–18.
– notice: Allerton Press, Inc. 2024.
DBID AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.3103/S0146411624700706
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Materials Science & Engineering
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-108X
EndPage 1099
ExternalDocumentID 10_3103_S0146411624700706
GroupedDBID -Y2
-~X
.86
.VR
06D
0R~
0VY
1N0
23N
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
4.4
408
40D
40E
5GY
5VS
6NX
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABDBE
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACCUX
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADKNI
ADRFC
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEMSY
AEOHA
AEPYU
AETLH
AEVLU
AEXYK
AFBBN
AFFNX
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AI.
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
AXYYD
B-.
BA0
BDATZ
BGNMA
CAG
COF
CS3
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ7
H13
HF~
HG6
HLICF
HMJXF
HRMNR
HZ~
IJ-
IKXTQ
IWAJR
I~X
I~Z
J-C
JBSCW
JZLTJ
KOV
LLZTM
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P9O
PF0
PT4
QOS
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TN5
TSG
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VH1
W48
WK8
YLTOR
ZMTXR
~A9
AAYXX
ABFSG
ABJCF
ABRTQ
ACSTC
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
K7-
M7S
PHGZM
PHGZT
PQGLB
PTHSS
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
L6V
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c198t-184f9ac952df46b18ab5033d9ba365ddc5269f4114c532b62af9065b32b9230a3
IEDL.DBID RSV
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001444845400034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0146-4116
IngestDate Tue Dec 02 09:52:30 EST 2025
Sat Nov 29 08:07:26 EST 2025
Sat Mar 15 01:10:33 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords corporate computer network
information security system
model for forming the system composition
algorithm
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c198t-184f9ac952df46b18ab5033d9ba365ddc5269f4114c532b62af9065b32b9230a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 3254841688
PQPubID 2043879
PageCount 7
ParticipantIDs proquest_journals_3254841688
crossref_primary_10_3103_S0146411624700706
springer_journals_10_3103_S0146411624700706
PublicationCentury 2000
PublicationDate 20241200
2024-12-00
20241201
PublicationDateYYYYMMDD 2024-12-01
PublicationDate_xml – month: 12
  year: 2024
  text: 20241200
PublicationDecade 2020
PublicationPlace Moscow
PublicationPlace_xml – name: Moscow
– name: New York
PublicationTitle Automatic control and computer sciences
PublicationTitleAbbrev Aut. Control Comp. Sci
PublicationYear 2024
Publisher Pleiades Publishing
Springer Nature B.V
Publisher_xml – name: Pleiades Publishing
– name: Springer Nature B.V
References 7769_CR7
7769_CR3
7769_CR5
7769_CR6
7769_CR22
7769_CR21
7769_CR2
V.V. Platonov (7769_CR15) 2014; 17
7769_CR25
M.O. Kalinin (7769_CR18) 2021; 55
7769_CR23
E.A. Popova (7769_CR24) 2020; 54
7769_CR28
P.D. Zegzhda (7769_CR26) 2020; 54
7769_CR27
D.S. Lavrova (7769_CR11) 2014; 17
M.A. Poltavtseva (7769_CR1) 2019; 53
A.O. Alekseyev (7769_CR17) 1988; 26
P.D. Zegzhda (7769_CR16) 2020; 54
A.D. Fatin (7769_CR20) 2020; 54
V.G. Anisimov (7769_CR14) 2017; 51
M. Kalinin (7769_CR8) 2023; 23
V.G. Anisimov (7769_CR10) 2018; 52
7769_CR30
M. Kalinin (7769_CR4) 2021; 9
V.G. Anisimov (7769_CR29) 1997; 37
7769_CR19
T.N. Saurenko (7769_CR13) 2020; 9
D.P. Zegzhda (7769_CR12) 2023; 57
M. Kalinin (7769_CR9) 2022; 14
References_xml – volume: 14
  start-page: 2208
  year: 2022
  ident: 7769_CR9
  publication-title: Symmetry
  doi: 10.3390/sym14102208
– volume: 17
  start-page: 263
  year: 2014
  ident: 7769_CR11
  publication-title: Nonlinear Phenom. Complex Syst.
– ident: 7769_CR3
– volume: 57
  start-page: 881
  year: 2023
  ident: 7769_CR12
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s0146411623080357
– ident: 7769_CR25
– volume: 55
  start-page: 1165
  year: 2021
  ident: 7769_CR18
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s014641162108040x
– volume: 9
  start-page: 78
  year: 2021
  ident: 7769_CR4
  publication-title: Machines
  doi: 10.3390/machines9040078
– ident: 7769_CR7
– ident: 7769_CR21
– volume: 54
  start-page: 983
  year: 2020
  ident: 7769_CR20
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s014641162008012x
– ident: 7769_CR23
– volume: 53
  start-page: 895
  year: 2019
  ident: 7769_CR1
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s014641161908025x
– volume: 9
  start-page: 6259
  year: 2020
  ident: 7769_CR13
  publication-title: International Journal of Scientific and Technology Research
– volume: 52
  start-page: 1105
  year: 2018
  ident: 7769_CR10
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s0146411618080035
– volume: 54
  start-page: 864
  year: 2020
  ident: 7769_CR16
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s0146411620080362
– ident: 7769_CR6
  doi: 10.1145/3136825.3136890
– ident: 7769_CR28
– volume: 54
  start-page: 907
  year: 2020
  ident: 7769_CR24
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s0146411620080295
– volume: 26
  start-page: 130
  year: 1988
  ident: 7769_CR17
  publication-title: Sov. J. Comput. Syst. Sci.
– ident: 7769_CR22
– volume: 37
  start-page: 175
  year: 1997
  ident: 7769_CR29
  publication-title: Comput. Math. Math. Phys.
– volume: 23
  start-page: 8724
  year: 2023
  ident: 7769_CR8
  publication-title: Sensors
  doi: 10.3390/s23218724
– volume: 17
  start-page: 284
  year: 2014
  ident: 7769_CR15
  publication-title: Nonlinear Phenom. Complex Syst.
– volume: 51
  start-page: 824
  year: 2017
  ident: 7769_CR14
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s0146411617080053
– ident: 7769_CR5
  doi: 10.31799/1684-8853-2019-5-18-23
– ident: 7769_CR19
– ident: 7769_CR27
  doi: 10.53816/23061456_2022_9-10_13
– ident: 7769_CR30
– volume: 54
  start-page: 930
  year: 2020
  ident: 7769_CR26
  publication-title: Autom. Control Comput. Sci.
  doi: 10.3103/s0146411620080374
– ident: 7769_CR2
  doi: 10.1145/1854099.1854125
SSID ssj0055886
Score 2.294226
Snippet This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 1093
SubjectTerms Algorithms
Composition
Computer networks
Computer Science
Control Structures and Microprogramming
Cybersecurity
Decision making
Mathematical programming
Security systems
Variables
SummonAdditionalLinks – databaseName: Engineering Database
  dbid: M7S
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LSwMxEB60etCDb7FaJQdPSmizyWaTk4hYPEgRq9DbkteCl7a21d9vks1SH-jF0y4JDMtMdvJlZjIfwDnLM0sINVixymFmbYG1IxZTLjRRismsV5NNFIOBGI3kQwq4zVNZZeMTo6O2ExNi5F3qTzIhRSbE1fQVB9aokF1NFBqrsBa6JJBYujdsPHGei8j0GPqjYEYIr7OagVmrG4qaeBjLWBFa3vCv-9ISbH7Lj8Ztp7_93w_ega0EONF1vUJ2YcWN92DzUxvCfbiPlF5Vit6hSYU8KkSPKUyIgstIpV3NXLrEFIeGiQEP1c3PD-C5f_t0c4cTywI2RIoF9ke8SiojvdEqxjURSofUppVaUZ5bawIHeeVVxUxOM80zVUmPW7R_9-Cwp-ghtMaTsTsCVBgnGeVenjYehvmH94dKC8ecVFT22nDR6Lic1s00Sn8ICQYpfxikDZ1Gr2X6r-blUqltuGwss5z-Vdjx38JOYCPzYKUuU-lAazF7c6ewbt4XL_PZWVxUHzYW0Nc
  priority: 102
  providerName: ProQuest
Title Justification of the Rational Composition of the Information Security System
URI https://link.springer.com/article/10.3103/S0146411624700706
https://www.proquest.com/docview/3254841688
Volume 58
WOSCitedRecordID wos001444845400034&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: P5Z
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: K7-
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: M7S
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 20241209
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: BENPR
  dateStart: 20230201
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVAVX
  databaseName: SpringerLink Contemporary
  customDbUrl:
  eissn: 1558-108X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0055886
  issn: 0146-4116
  databaseCode: RSV
  dateStart: 20070201
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFH-4zYMenE7F6Sw9eFKCTZOmyVFlQ1DG2FSGl5KkLXjZZJv-_SZtgt8HvbSlSUP68vV7eS_vB3BCkzjHmGgkaVkgmucpUgXOEWFcYSmpiKOabCIdDvl0KkbuHPfSe7t7k2Q1U1d6ZUTOrRsSoxizmKY2SA1rQMusdtzyNYwnD376TRJe0Tva3Mhmr02ZPxfxeTF6R5hfjKLVWjNo_6uW27DloGV4UfeFHVgrZh1oe9qG0I3iDmx-iEG4C7cVn1fptu7CeRkaSBiO3R5haD93fl0-zZ1gql5NHP1dWEc-34P7Qf_u6ho5igWkseArZPS7UkgtTIuVlCnMpbJ2zVwoSViS59oSkJfmf6hOSKxYLEthQIsyzwYZRpLsQ3M2nxUHEKa6EJQwU57SBoOZm5kMpeIFLYQkIurCqZd19lxH0siMBmKlln2TWhd6vjUyN6iWGTHKrLWSct6FMy_99-RfCzv8U-4j2IgNcKldVnrQXC1eimNY16-rp-UigNZlfzgaB9C4SVFgPUUn5jpKHoOqF74BXWvQBA
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LSwMxEB5qFdSDb7E-96AXJbSbZB85iIhaKq1FtEJva5LNgpe2tlXxT_kbneyD-kBvHjztksCwm5lM5pX5APa5R2PXZZpInhjC4zggyrgxYX6oXCm5oLUMbCJot8NuV1yX4K24C2PLKgudmCrquK9tjLzK0JOxKbIwPBk8EosaZbOrBYRGJhZN8_qCLtvo-PIc-XtAaf2ic9YgOaoA0ehgjwm6NImQWuBHJtxXbiiVTeXFQknme3GsLeZ2wtFP0B6jyqcyEXhOK3xHY6gmGdKdgmnOwsDuq2ZACs3veWGKLGn7sRAk4GdZVIvkVbVFVL4dozywLXb8z-fgxLj9ko9Nj7n64n9boCVYyA1q5zTbActQMr0VmP_QZnEVWilkWZJHJ51-4qDV69zkYVDHqsS8dK2Yyy9ppUO3OcKfkzV3X4O7P_mddSj3-j2zAU6gjeDMR3pKo5mJD9T3UoWGGyGZqFXgsOBpNMiahUToZFkBiL4JQAW2Cz5Gud4YRRMmVuCokITJ9I_ENn8ntgezjc5VK2pdtptbMEfRMMtKcrahPB4-mR2Y0c_jh9FwNxVoB-7_WkDeAUrGLAM
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BQQgGylMUCnhgAllNYie1RwRUIKqqooC6RX7EEktatYHfj504Ks8BMSWKnVNyfn3nO98HcEbjSIchUVhQk2GqdRfLLNSYJEyGQlAeBRXZRHcwYOMxH3qe03kd7V67JKszDS5LU150ptp0ShszIB0XkpTQMEwi2nUJa5JlWKEujt6Z66PneiqOY1ZSPbra2FWv3Jo_i_i8MC3Q5hcHabnu9Jr__uIt2PSQE11WfWQblrJ8B5o1nQPyo3sHNj7kJtyFfsnzZfyWHpoYZKEievB7h8i97uO96jJ_sql8NPK0eKjKiL4HT72bx6tb7KkXsAo5K7C1-wwXituWNDSRIRPS-Ts1l4IksdbKEZMb-z9UxSSSSSQMt2BG2nuLGANB9qGRT_LsAFBXZZySxMqTymIze7GTpJAsoxkXhActOK_1nk6rDBuptUyc1tJvWmtBu26Z1A-2eUqskeu8p4y14KJuiUXxr8IO_1T7FNaG1720fze4P4L1yGKbKqqlDY1i9podw6p6K17ms5OyC74D0hbXag
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Justification+of+the+Rational+Composition+of+the+Information+Security+System&rft.jtitle=Automatic+control+and+computer+sciences&rft.au=Suprun%2C+A.+F.&rft.au=Zegzhda%2C+D.+P.&rft.au=Anisimov%2C+V.+G.&rft.au=Anisimov%2C+E.+D.&rft.date=2024-12-01&rft.pub=Pleiades+Publishing&rft.issn=0146-4116&rft.eissn=1558-108X&rft.volume=58&rft.issue=8&rft.spage=1093&rft.epage=1099&rft_id=info:doi/10.3103%2FS0146411624700706&rft.externalDocID=10_3103_S0146411624700706
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0146-4116&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0146-4116&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0146-4116&client=summon