{"id":"https://openalex.org/W4313209353","doi":"https://doi.org/10.3390/sym14122631","title":"Cognitive Model for Assessing the Security of Information Systems for Various Purposes","display_name":"Cognitive Model for Assessing the Security of Information Systems for Various Purposes","publication_year":2022,"publication_date":"2022-12-12","ids":{"openalex":"https://openalex.org/W4313209353","doi":"https://doi.org/10.3390/sym14122631"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym14122631","pdf_url":"https://www.mdpi.com/2073-8994/14/12/2631/pdf?version=1671691711","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-8994/14/12/2631/pdf?version=1671691711","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044082458","display_name":"\u0412\u043b\u0430\u0434\u0438\u043c\u0438\u0440 \u0412. \u0411\u0430\u0440\u0430\u043d\u043e\u0432","orcid":"https://orcid.org/0000-0003-4818-7807"},"institutions":[{"id":"https://openalex.org/I4210100633","display_name":"Platov South-Russian State Polytechnic University","ror":"https://ror.org/00vqyrr20","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210100633"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Vladimir V. Baranov","raw_affiliation_strings":["Department of \"Information Security\", M.I. Platov South Russian State Polytechnic University, 346428 Novocherkassk, Russia"],"affiliations":[{"raw_affiliation_string":"Department of \"Information Security\", M.I. Platov South Russian State Polytechnic University, 346428 Novocherkassk, Russia","institution_ids":["https://openalex.org/I4210100633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029791948","display_name":"Alexander Shelupanov","orcid":"https://orcid.org/0000-0003-2393-6701"},"institutions":[{"id":"https://openalex.org/I114376631","display_name":"Tomsk State University of Control Systems and Radio-Electronics","ror":"https://ror.org/032j5hw78","country_code":"RU","type":"education","lineage":["https://openalex.org/I114376631"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Alexander A. Shelupanov","raw_affiliation_strings":["Department of \"Integrated Information Security of Electronic Computing Systems\", Tomsk State University of Control Systems and Radioelectronics (TUSUR), 634034 Tomsk, Russia"],"affiliations":[{"raw_affiliation_string":"Department of \"Integrated Information Security of Electronic Computing Systems\", Tomsk State University of Control Systems and Radioelectronics (TUSUR), 634034 Tomsk, Russia","institution_ids":["https://openalex.org/I114376631"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5044082458","https://openalex.org/A5029791948"],"corresponding_institution_ids":["https://openalex.org/I4210100633","https://openalex.org/I114376631"],"apc_list":{"value":2000,"currency":"CHF","value_usd":2165,"provenance":"doaj"},"apc_paid":{"value":2000,"currency":"CHF","value_usd":2165,"provenance":"doaj"},"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":60},"biblio":{"volume":"14","issue":"12","first_page":"2631","last_page":"2631"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T14512","display_name":"Technology and Human Factors in Education and Health","score":0.9694,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T14512","display_name":"Technology and Human Factors in Education and Health","score":0.9694,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.9646,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.9644,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance","score":0.6472244},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5345748},{"id":"https://openalex.org/keywords/information-model","display_name":"Information model","score":0.4301027}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7561065},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.6613979},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.6472244},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5345748},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.49482673},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4939316},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.48207146},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48187193},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.46782038},{"id":"https://openalex.org/C21338462","wikidata":"https://www.wikidata.org/wiki/Q1662581","display_name":"Information model","level":2,"score":0.4301027},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.41543746},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4056083},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.38632813},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.16190258},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.14345855},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12736818},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08887762},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym14122631","pdf_url":"https://www.mdpi.com/2073-8994/14/12/2631/pdf?version=1671691711","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/089c52905b074e61a2b273f2151d0ca4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.3390/sym14122631","pdf_url":"https://www.mdpi.com/2073-8994/14/12/2631/pdf?version=1671691711","source":{"id":"https://openalex.org/S190787756","display_name":"Symmetry","issn_l":"2073-8994","issn":["2073-8994"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.74,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W121156271","https://openalex.org/W1480376833","https://openalex.org/W1489756826","https://openalex.org/W1678659446","https://openalex.org/W1748537427","https://openalex.org/W2044252530","https://openalex.org/W2052086751","https://openalex.org/W2536179434","https://openalex.org/W2602595971","https://openalex.org/W2610275900","https://openalex.org/W2626631366","https://openalex.org/W2765493461","https://openalex.org/W2791104480","https://openalex.org/W2897312458","https://openalex.org/W2902658407","https://openalex.org/W2987677324","https://openalex.org/W3043083589","https://openalex.org/W3094701468","https://openalex.org/W3094831690","https://openalex.org/W3100448747","https://openalex.org/W3110712162","https://openalex.org/W3146067477","https://openalex.org/W3158073486","https://openalex.org/W3182847718","https://openalex.org/W3191125156","https://openalex.org/W4200507171","https://openalex.org/W4290043225","https://openalex.org/W4290999202"],"related_works":["https://openalex.org/W4310892428","https://openalex.org/W4293770853","https://openalex.org/W2777401565","https://openalex.org/W2508914475","https://openalex.org/W2362334938","https://openalex.org/W2356973015","https://openalex.org/W2303053547","https://openalex.org/W2248314326","https://openalex.org/W2120971814","https://openalex.org/W2033357182"],"abstract_inverted_index":{"This":[0,115],"article":[1,34],"substantiates":[2],"the":[3,6,14,44,47,51,57,64,84,91,99,132,140,154],"relevance":[4],"of":[5,8,16,28,50,77,86,93,98,102,123,134,144,148,156,159],"development":[7],"a":[9],"cognitive":[10],"model":[11,106],"for":[12,19,46,83,131],"assessing":[13],"security":[15,30,88,136,146],"information":[17,29,78,87,135,145,160],"systems":[18],"various":[20,96,149],"purposes,":[21],"designed":[22],"to":[23,119,138,152],"support":[24],"decision-making":[25],"by":[26],"officials":[27],"management":[31,158],"bodies.":[32],"The":[33],"analyzes":[35],"scientific":[36],"papers":[37],"and":[38,53,55,72,81,112,125,129,151],"research":[39],"in":[40],"this":[41],"area,":[42],"formulates":[43],"requirements":[45],"functional":[48],"capabilities":[49],"model,":[52],"investigates":[54],"identifies":[56],"most":[58],"appropriate":[59],"modeling":[60],"tools,":[61],"based":[62],"on":[63],"symmetry":[65],"property":[66],"that":[67],"develops":[68],"from":[69],"integrated":[70],"ontological":[71],"neuro-Bayesian":[73],"models;":[74],"typical":[75],"clusters":[76],"systems;":[79],"tactics":[80],"techniques":[82],"implementation":[85,133],"threats":[89],"through":[90],"vulnerabilities":[92,128],"objects":[94,122],"at":[95],"levels":[97],"International":[100],"Organization":[101],"Standardization/Open":[103],"Systems":[104],"Interconnection":[105],"(the":[107],"ISO/OSI":[108],"model);":[109],"protective":[110],"influences;":[111],"attacking":[113],"influences.":[114],"approach":[116],"allowed":[117],"us":[118],"identify":[120],"such":[121],"influence":[124],"their":[126],"current":[127],"scenarios":[130],"threats;":[137],"calculate":[139],"joint":[141],"probability":[142],"distribution":[143],"events":[147],"origins;":[150],"simulate":[153],"process":[155],"operational":[157],"security.":[161]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4313209353","counts_by_year":[],"updated_date":"2024-12-09T22:21:24.191277","created_date":"2023-01-06"}