{"leader":"00775naa#a2200205#i#450#","fields":[{"001":"EN\\\\bibl\\30719"},{"003":"\/en\/manage\/index"},{"005":"20241114175922.4"},{"011":{"ind1":"#","ind2":"#","subfields":[{"a":"2658-6436"}]}},{"100":{"ind1":"#","ind2":"#","subfields":[{"a":"20190930b2019####ek#y0engy0150####ca"}]}},{"101":{"ind1":"0","ind2":"#","subfields":[{"a":"RUS"}]}},{"102":{"ind1":"#","ind2":"#","subfields":[{"a":"RU"}]}},{"200":{"ind1":"1","ind2":"#","subfields":[{"a":"APPLICATION OF STRIDE METHODOLOGY FOR DETERMINING CURRENT SECURITY THREATS FOR PROGRAM-DEFINED NETWORKS"},{"e":"Journal article"}]}},{"210":{"ind1":"1","ind2":"#","subfields":[{"a":"Bryansk"},{"c":"Bryansk State Technical University"},{"d":"2019"}]}},{"215":{"ind1":"#","ind2":"#","subfields":[{"a":"5 \u00d1\u0081."}]}},{"608":{"ind1":"#","ind2":"#","subfields":[{"a":"Journal article"},{"2":"local"}]}},{"686":{"ind1":"#","ind2":"#","subfields":[{"a":"\u00d0\u00a1\u00d0\u00b8\u00d1\u0081\u00d1\u0082\u00d0\u00b5\u00d0\u00bc\u00d1\u008b \u00d0\u00b0\u00d0\u00b2\u00d1\u0082\u00d0\u00be\u00d0\u00bc\u00d0\u00b0\u00d1\u0082\u00d0\u00b8\u00d1\u0087\u00d0\u00b5\u00d1\u0081\u00d0\u00ba\u00d0\u00be\u00d0\u00b3\u00d0\u00be \u00d1\u0083\u00d0\u00bf\u00d1\u0080\u00d0\u00b0\u00d0\u00b2\u00d0\u00bb\u00d0\u00b5\u00d0\u00bd\u00d0\u00b8\u00d1\u008f, \u00d1\u0080\u00d0\u00b5\u00d0\u00b3\u00d1\u0083\u00d0\u00bb\u00d0\u00b8\u00d1\u0080\u00d0\u00be\u00d0\u00b2\u00d0\u00b0\u00d0\u00bd\u00d0\u00b8\u00d1\u008f \u00d0\u00b8 \u00d0\u00ba\u00d0\u00be\u00d0\u00bd\u00d1\u0082\u00d1\u0080\u00d0\u00be\u00d0\u00bb\u00d1\u008f. 50.43"},{"2":"grnti"}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Rytov"},{"g":"Mikhail Yurievich"}]}},{"700":{"ind1":"#","ind2":"1","subfields":[{"a":"Kalashnikov"},{"g":"Ruslan Yurevich"}]}},{"856":{"ind1":"4","ind2":"#","subfields":[{"a":"test.editorum.ru"},{"u":"\/en\/manage\/index"}]}}]}