{"leader":"00761naa#a2200193#i#450#","fields":[{"001":"EN\\\\bibl\\98921"},{"005":"20251208191357.1"},{"011":{"ind1":"#","ind2":"#","subfields":[{"a":"2218-130X"}]}},{"100":{"ind1":"#","ind2":"#","subfields":[{"a":"20250518b2025####ek#y0engy0150####ca"}]}},{"102":{"ind1":"#","ind2":"#","subfields":[{"a":"RU"}]}},{"200":{"ind1":"1","ind2":"#","subfields":[{"a":"METHODOLOGY FOR ANALYZING EVENT LOGS OF INFORMATION SYSTEMS USING ELASTICSEARCH TO DETECT SIGNALS OF MALICIOUS ACTIVITIES IN INFORMATION SYSTEMS"},{"e":"Journal article"}]}},{"210":{"ind1":"1","ind2":"#","subfields":[{"a":"Saint-Petersburg"},{"c":"Saint-Petersburg University of State Fire Service of Emercom of Russia"},{"d":"2025"}]}},{"215":{"ind1":"#","ind2":"#","subfields":[{"a":"14 \u00d1\u0081."}]}},{"608":{"ind1":"#","ind2":"#","subfields":[{"a":"Journal article"},{"2":"local"}]}},{"675":{"ind1":"#","ind2":"#","subfields":[{"a":"\u00d0\u0091\u00d0\u00b5\u00d0\u00b7\u00d0\u00be\u00d0\u00bf\u00d0\u00b0\u00d1\u0081\u00d0\u00bd\u00d0\u00be\u00d1\u0081\u00d1\u0082\u00d1\u008c, \u00d0\u00b7\u00d0\u00b0\u00d1\u0089\u00d0\u00b8\u00d1\u0089\u00d1\u0091\u00d0\u00bd\u00d0\u00bd\u00d0\u00be\u00d1\u0081\u00d1\u0082\u00d1\u008c \u00d0\u00b4\u00d0\u00b0\u00d0\u00bd\u00d0\u00bd\u00d1\u008b\u00d1\u0085. 004.056"},{"z":""}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Dudnikov"},{"g":"Ivan A."}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Sharikov"},{"g":"Pavel I."}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Maiorov"},{"g":"Alexander V."}]}},{"856":{"ind1":"4","ind2":"#","subfields":[{"a":"journals.igps.ru"},{"u":""}]}}]}