{"id":"https://openalex.org/W4408440040","doi":"https://doi.org/10.3103/s0146411624700809","title":"Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources","display_name":"Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources","publication_year":2024,"publication_date":"2024-12-01","ids":{"openalex":"https://openalex.org/W4408440040","doi":"https://doi.org/10.3103/s0146411624700809"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411624700809","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411624700809","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028814593","display_name":"Mykola Fedosenko","orcid":null},"institutions":[{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"M. Yu. Fedosenko","raw_affiliation_strings":["ITMO University, 197101, St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"ITMO University, 197101, St. Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5028814593"],"corresponding_institution_ids":["https://openalex.org/I173089394"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.52524386,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"58","issue":"8","first_page":"1169","last_page":"1179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14258","display_name":"Legal and Policy Issues","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13271","display_name":"Ukrainian Legal and Forensic Studies","score":0.9509000182151794,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12734","display_name":"Information Systems and Technology Applications","score":0.9383999705314636,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8475204706192017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7116215229034424},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.611029326915741},{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.5869525074958801},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5821412801742554},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5805763602256775},{"id":"https://openalex.org/keywords/information-exchange","display_name":"Information exchange","score":0.5646065473556519},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.5628655552864075},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5015087127685547},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.46409597992897034},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4287574887275696},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.23077279329299927},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18363037705421448},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.18197166919708252},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13184446096420288},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.10545635223388672},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0983990728855133},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07198390364646912}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8475204706192017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7116215229034424},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.611029326915741},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.5869525074958801},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5821412801742554},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5805763602256775},{"id":"https://openalex.org/C189693848","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information exchange","level":2,"score":0.5646065473556519},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.5628655552864075},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5015087127685547},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.46409597992897034},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4287574887275696},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.23077279329299927},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18363037705421448},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.18197166919708252},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13184446096420288},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.10545635223388672},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0983990728855133},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07198390364646912},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411624700809","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411624700809","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W6892051730"],"related_works":["https://openalex.org/W2497446005","https://openalex.org/W1971333002","https://openalex.org/W4239527169","https://openalex.org/W2388309080","https://openalex.org/W2382286281","https://openalex.org/W2376498788","https://openalex.org/W2388321897","https://openalex.org/W4366376231","https://openalex.org/W3088996408","https://openalex.org/W3130155726"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"the":[3,6,48,61,64,94,97,106,127,155,166,174,177,190,193,196,205,217,224,233,237,251,257,264,268,294,306,321,325],"stage":[4],"of":[5,9,13,20,36,50,55,63,78,96,105,120,122,129,134,136,142,161,168,176,179,192,198,226,235,240,263,271,278,289,298,301,308,315],"practical":[7],"control":[8],"information":[10,32,86,302],"security":[11,87],"risks":[12,133,197],"a":[14,18,24,30,117,123,199,228,290],"web":[15,124,200,291,326],"resource":[16,125,201,292],"as":[17,23,43,211,213,310,312],"result":[19],"its":[21],"use":[22,77,184,270,300],"medium":[25],"and":[26,53,102,140,159,219,245,259,275,282,319],"communication":[27],"channel":[28],"in":[29,39,185,305],"steganographic":[31,79,90],"exchange.":[33,188],"The":[34,85,242],"possibility":[35],"using":[37,227],"steganography":[38],"public":[40],"internet":[41],"resources":[42],"an":[44,82],"intruder\u2019s":[45],"tool":[46],"for":[47,74,100,181,286,317],"exchange":[49],"illegal":[51],"data":[52,180,322],"realization":[54],"computer":[56],"attacks":[57],"is":[58,69,81],"established":[59],"on":[60,126],"basis":[62,191],"available":[65],"research":[66],"results.":[67],"It":[68],"proved":[70],"that":[71],"developing":[72],"methods":[73,91,254],"preventing":[75],"malicious":[76,183,269,299],"algorithms":[80],"urgent":[83],"task.":[84],"threats":[88,112,121],"concerning":[89],"according":[92],"to":[93,115,149,222,231,255],"database":[95],"Federal":[98,143,150,169],"Service":[99],"Technical":[101],"Export":[103],"Control":[104],"Russian":[107],"Federation":[108],"are":[109,113,202,248],"considered.":[110],"These":[111,273],"used":[114],"develop":[116],"four-level":[118],"model":[119],"part":[128],"user":[130],"data,":[131],"including":[132],"violation":[135],"integrity,":[137],"access,":[138],"confidentiality,":[139],"statements":[141,167],"Law":[144,151,170],"no.":[145,152,171],"374-FL":[146,172],"(and":[147],"corrections":[148],"149-FL":[153],"On":[154,189],"Information,":[156],"Information":[157],"Technologies,":[158],"Protection":[160],"Information).":[162],"Taking":[163],"into":[164],"account":[165],"demonstrates":[173],"problem":[175,234,297],"unavailability":[178],"checking":[182],"their":[186,280],"covert":[187],"developed":[194],"model,":[195],"assessed":[203],"by":[204,216,250],"Microsoft":[206],"Security":[207],"Assessment":[208],"Tool":[209],"(MSAT),":[210],"well":[212,311],"theoretically":[214],"estimated":[215],"FRAP":[218],"CRAMM":[220],"matrices":[221],"demonstrate":[223],"peculiarities":[225],"specific":[229],"approach":[230],"solve":[232],"countering":[236,318],"new":[238],"type":[239],"attacks.":[241],"necessary":[243],"measures":[244,274],"mitigation":[246],"components":[247,266,276],"calculated":[249],"mathematical":[252],"programming":[253],"reveal":[256],"minimal":[258],"optimal":[260],"quantitative":[261],"composition":[262],"protection":[265,288,303],"against":[267],"steganography.":[272],"consist":[277],"specialists,":[279],"competencies,":[281],"software":[283],"tools":[284,316],"needed":[285],"high-quality":[287],"within":[293],"studied":[295],"scientific":[296],"technologies":[304],"course":[307],"malpractice,":[309],"further":[313],"development":[314],"analyzing":[320],"arriving":[323],"at":[324],"resource.":[327]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
