{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:59:40Z","timestamp":1730321980070,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T00:00:00Z","timestamp":1568246400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,12]]},"DOI":"10.1145\/3357613.3357620","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T08:19:56Z","timestamp":1574669996000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimization of the cyber security system structure based on accounting of the prevented damage cost"],"prefix":"10.1145","author":[{"given":"Igor","family":"Kotenko","sequence":"first","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Saint-Petersburg, Russia"}]},{"given":"Igor","family":"Saenko","sequence":"additional","affiliation":[{"name":"Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Saint-Petersburg, Russia"}]},{"given":"Yury","family":"Sineshchuk","sequence":"additional","affiliation":[{"name":"Saint-Petersburg University of the Ministry of Internal Affairs of the Russian Federation, Saint-Petersburg, Russia"}]},{"given":"Valery","family":"Kuvatov","sequence":"additional","affiliation":[{"name":"Saint-Petersburg University of the Ministry of Internal Affairs of the Russian Federation, Saint-Petersburg, Russia"}]},{"given":"Oleg","family":"Chudakov","sequence":"additional","affiliation":[{"name":"Saint-Petersburg University of the Ministry of Internal Affairs of the Russian Federation, Saint-Petersburg, Russia"}]}],"member":"320","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"key":"e_1_3_2_1_2_1","unstructured":"DOD 5200.28-STD. DOD Trusted Computer System Evaluation Criteria (Orange Book) https:\/\/csrc.nist.gov\/csrc\/media\/publications\/conference-paper\/1998\/10\/08\/proceedings-of-the-21st-nissc-1998\/documents\/early-cs-papers\/dod85.pdf. DOD 5200.28-STD. DOD Trusted Computer System Evaluation Criteria (Orange Book) https:\/\/csrc.nist.gov\/csrc\/media\/publications\/conference-paper\/1998\/10\/08\/proceedings-of-the-21st-nissc-1998\/documents\/early-cs-papers\/dod85.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359228"},{"key":"e_1_3_2_1_4_1","volume-title":"Network Security: Private Communication in a Public World","author":"Kaufman Charlie","year":"1995","unstructured":"Charlie Kaufman , Radia Perlman , and Mike Speciner . 1995 . Network Security: Private Communication in a Public World . PTR Prentice Hall , Englewood Cliffs , New Jersey. Charlie Kaufman, Radia Perlman, and Mike Speciner. 1995. Network Security: Private Communication in a Public World. PTR Prentice Hall, Englewood Cliffs, New Jersey."},{"key":"e_1_3_2_1_5_1","volume-title":"BS ISO 17799","author":"Information Security Management Information Technology","year":"2005","unstructured":"Information Technology Code of Practice for Information Security Management : BS ISO 17799 . 2005 . BSI Standards . Information Technology Code of Practice for Information Security Management: BS ISO 17799. 2005. BSI Standards."},{"key":"e_1_3_2_1_6_1","first-page":"303","volume-title":"Proceedings of the 21st National Information Systems Security Conference","author":"Loscocco Peter A.","year":"1998","unstructured":"Peter A. Loscocco , Stephen D. Smalley , Patrick A. Muckelbauer , Ruth C. Taylor , S. Jeff Turner , and John F. Farrell . 1998. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , In Proceedings of the 21st National Information Systems Security Conference , 1998 , pp. 303 -- 314 . Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner, and John F. Farrell. 1998. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments, In Proceedings of the 21st National Information Systems Security Conference, 1998, pp. 303--314."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.431"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48829-5_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.9790\/0661-16293542"},{"key":"e_1_3_2_1_10_1","unstructured":"Vladimir A. Chobanyan Igor Yu. Shahalov. 2013. Analysis and synthesis of the requirements for safety systems of objects of critical information infrastructure. Issues of cybersecurity 1(1) 7--27. Vladimir A. Chobanyan Igor Yu. Shahalov. 2013. Analysis and synthesis of the requirements for safety systems of objects of critical information infrastructure. Issues of cybersecurity 1(1) 7--27."},{"key":"e_1_3_2_1_11_1","volume-title":"Singer and Allan Friedman","author":"Peter","year":"2014","unstructured":"Peter W. Singer and Allan Friedman . 2014 . Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press . Peter W. Singer and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2011.5716502"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936160"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep19540"},{"key":"e_1_3_2_1_16_1","volume-title":"Tag Gon Kim, and Herbert Praehofer","author":"Zeigler Bernard P.","year":"2000","unstructured":"Bernard P. Zeigler , Tag Gon Kim, and Herbert Praehofer . 2000 . Theory of Modeling and Simulation (2nd ed.). Academic Press , Inc., Orlando, FL, USA. Bernard P. Zeigler, Tag Gon Kim, and Herbert Praehofer. 2000. Theory of Modeling and Simulation (2nd ed.). Academic Press, Inc., Orlando, FL, USA."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2005.11.018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"359","DOI":"10.31399\/asm.hb.v04c.a0005892","article-title":"Basic principles of optimal design of electromagnetic devices and multi-objective optimization. ASM Handbook","volume":"4","author":"Barba Paolo Di","year":"2014","unstructured":"Paolo Di Barba . 2014 . Basic principles of optimal design of electromagnetic devices and multi-objective optimization. ASM Handbook , Induction Heating and Heat Treatment , 4C , 359 -- 365 . Paolo Di Barba. 2014. Basic principles of optimal design of electromagnetic devices and multi-objective optimization. ASM Handbook, Induction Heating and Heat Treatment, 4C, 359--365.","journal-title":"Induction Heating and Heat Treatment"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3233\/JAE-162249"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1108\/COMPEL-05-2016-0216"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/17415977.2015.1047366"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(94)E0023-Z"},{"issue":"20","key":"e_1_3_2_1_23_1","first-page":"5331","article-title":"A method of constructing a structured database of the typical objects of protection on the basis of cluster analysis","volume":"95","author":"Minkin Denis Y.","year":"2017","unstructured":"Denis Y. Minkin , Yuri I. Sineshchuk , Sergey N. Terekhin , and Konstantin S. Yusherov . 2017 . A method of constructing a structured database of the typical objects of protection on the basis of cluster analysis . Journal of Theoretical and Applied Information Technology , 95 ( 20 ), 5331 -- 5339 . Denis Y. Minkin, Yuri I. Sineshchuk, Sergey N. Terekhin, and Konstantin S. Yusherov. 2017. A method of constructing a structured database of the typical objects of protection on the basis of cluster analysis. Journal of Theoretical and Applied Information Technology, 95(20), 5331--5339.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2012.36"},{"issue":"90","key":"e_1_3_2_1_25_1","first-page":"155","article-title":"Selection of information protection system by ensuring the competitiveness of enterprises","volume":"2","author":"Popova Helena V.","year":"2014","unstructured":"Helena V. Popova . 2014 . Selection of information protection system by ensuring the competitiveness of enterprises . Scientific and Technical Journal of Information Technologies, Mechanics and Optics , 2 ( 90 ), 155 -- 160 . Helena V. Popova. 2014. Selection of information protection system by ensuring the competitiveness of enterprises. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2(90), 155--160.","journal-title":"Scientific and Technical Journal of Information Technologies, Mechanics and Optics"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00188-4"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581274"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/152399.152404"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-1993-22-308"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.128"}],"event":{"name":"SIN 2019: The 12th International Conference on Security of Information and Networks","acronym":"SIN 2019","location":"Sochi Russia"},"container-title":["Proceedings of the 12th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357613.3357620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T19:34:46Z","timestamp":1673724886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357613.3357620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,12]]},"references-count":29,"alternative-id":["10.1145\/3357613.3357620","10.1145\/3357613"],"URL":"https:\/\/doi.org\/10.1145\/3357613.3357620","relation":{},"subject":[],"published":{"date-parts":[[2019,9,12]]},"assertion":[{"value":"2019-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}