{"leader":"00726naa#a2200181#i#450#","fields":[{"001":"EN\\\\bibl\\118027"},{"005":"20260428121106.2"},{"011":{"ind1":"#","ind2":"#","subfields":[{"a":"3033-8239"}]}},{"100":{"ind1":"#","ind2":"#","subfields":[{"a":"20260401b2026####ek#y0engy0150####ca"}]}},{"102":{"ind1":"#","ind2":"#","subfields":[{"a":"RU"}]}},{"200":{"ind1":"1","ind2":"#","subfields":[{"a":"PROCESSING OF SIMULATION RESULTS OF COMPUTER ATTACKS ON THE OBJECT OF PROTECTION USING MACHINE LEARNING METHODS"},{"e":"Journal article"}]}},{"210":{"ind1":"1","ind2":"#","subfields":[{"a":"Armavir"},{"c":"Autonomous Non-Commercial Organization Research Institute \"Digital Philosophy - Digital Intelligence\""},{"d":"2026"}]}},{"215":{"ind1":"#","ind2":"#","subfields":[{"a":"0 \u00d1\u0081."}]}},{"608":{"ind1":"#","ind2":"#","subfields":[{"a":"Journal article"},{"2":"local"}]}},{"675":{"ind1":"#","ind2":"#","subfields":[{"a":"\u00d0\u0098\u00d1\u0081\u00d0\u00ba\u00d1\u0083\u00d1\u0081\u00d1\u0081\u00d1\u0082\u00d0\u00b2\u00d0\u00b5\u00d0\u00bd\u00d0\u00bd\u00d1\u008b\u00d0\u00b9 \u00d0\u00b8\u00d0\u00bd\u00d1\u0082\u00d0\u00b5\u00d0\u00bb\u00d0\u00bb\u00d0\u00b5\u00d0\u00ba\u00d1\u0082. 004.8"},{"z":""}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Dobryshin"},{"g":"Mikhail Mikhailovich"}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Zhilyaeva"},{"g":"Valeria Alekseevna"}]}},{"856":{"ind1":"4","ind2":"#","subfields":[{"a":"intellectualsovereignty.ru"},{"u":""}]}}]}