{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:43:24Z","timestamp":1757619804107,"version":"3.44.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031952982"},{"type":"electronic","value":"9783031952999"}],"license":[{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-95299-9_22","type":"book-chapter","created":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T06:43:56Z","timestamp":1753512236000},"page":"258-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research and Classification of Cybersecurity Threats in the E-Government System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0855-3318","authenticated-orcid":false,"given":"Inomjon","family":"Yarashov","sequence":"first","affiliation":[]},{"given":"Akmal","family":"Vorisov","sequence":"additional","affiliation":[]},{"given":"Avazbek","family":"Ismatillayev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2290-5786","authenticated-orcid":false,"given":"Rakhimberdiev","family":"Kuvonchbek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,27]]},"reference":[{"key":"22_CR1","first-page":"\u0422.141","volume-title":"Computers & Security","author":"S AlDaajeh","year":"2024","unstructured":"AlDaajeh, S., Alrabaee, S.: Strategic cybersecurity. In: Computers & Security, pp. \u0422.141\u2013\u0421.103845 (2024)"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"2120","DOI":"10.3390\/math12132120","volume":"12","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Saymanov, I.: Synthesis of optimal correction functions in the class of disjunctive normal forms. Mathematics. 12, 2120 (2024). https:\/\/doi.org\/10.3390\/math12132120","journal-title":"Mathematics"},{"issue":"1","key":"22_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.26577\/JMMCS202412114","volume":"121","author":"A Kabulov","year":"2024","unstructured":"Kabulov, A., Baizhumanov, A., Berdimurodov, M.: On minimising k-valued logic functions in the class of disjunctive normal forms. J. Math. Mech. Comput. Sci. 121(1), 37\u201345 (2024). https:\/\/doi.org\/10.26577\/JMMCS202412114","journal-title":"J. Math. Mech. Comput. Sci."},{"key":"22_CR4","first-page":"202","volume-title":"12th International Conference on Cyber Warfare and Security","author":"R Koch","year":"2017","unstructured":"Koch, R.: On the future of cybersecurity. In: 12th International Conference on Cyber Warfare and Security, pp. 202\u2013219 (2017)"},{"issue":"1","key":"22_CR5","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.30574\/ijsra.2024.11.1.0217","volume":"11","author":"OO Amoo","year":"2024","unstructured":"Amoo, O.O., Osasona, F., Atadoga, A., Ayinla, B.S., Farayola, O.A., Abrahams, T.O.: Cybersecurity threats in the age of IoT: a review of protective measures. Int. J. Sci. Res. Arch. 11(1), 1304\u20131310 (2024)","journal-title":"Int. J. Sci. Res. Arch."},{"key":"22_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IEMTRONICS55184.2022.9795729","volume-title":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada","author":"E Navruzov","year":"2022","unstructured":"Navruzov, E., Kabulov, A.: Detection and analysis types of DDoS attack. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, pp. 1\u20137 (2022). https:\/\/doi.org\/10.1109\/IEMTRONICS55184.2022.9795729"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IEMTRONICS52119.2021.9422486","volume-title":"2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada","author":"A Kabulov","year":"2021","unstructured":"Kabulov, A., Normatov, I., Urunbaev, E., Muhammadiev, F.: Invariant continuation of discrete multi-valued functions and their implementation. In: 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/IEMTRONICS52119.2021.9422486"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IEMTRONICS51293.2020.9216402","volume-title":"2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada","author":"A Kabulov","year":"2020","unstructured":"Kabulov, A., Normatov, I., Seytov, A., Kudaybergenov, A.: Optimal management of water resources in large main canals with cascade pumping stations. In: 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, pp. 1\u20134 (2020). https:\/\/doi.org\/10.1109\/IEMTRONICS51293.2020.9216402"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IEMTRONICS55184.2022.9795746","volume-title":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada","author":"A Kabulov","year":"2022","unstructured":"Kabulov, A., Yarashov, I., Otakhonov, A.: Algorithmic analysis of the system based on the functioning table and information security. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/IEMTRONICS55184.2022.9795746"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"6361","DOI":"10.3390\/app14146361","volume":"14","author":"M Al-Zubaidie","year":"2024","unstructured":"Al-Zubaidie, M., Jebbar, W.A.: Providing security for flash loan system using cryptocurrency wallets supported by XSalsa20 in a blockchain environment. Appl. Sci. 14, 6361 (2024). https:\/\/doi.org\/10.3390\/app14146361","journal-title":"Appl. Sci."},{"key":"22_CR11","first-page":"1","volume":"4","author":"W Jebbar","year":"2024","unstructured":"Jebbar, W., Al-Zubaidie, M.: Transaction security and management of blockchain-based smart contracts in e-banking-employing micro-segmentation and yellow saddle goatfish. Mesopotamian J. Cybersecur. 4, 1\u201319 (2024)","journal-title":"Mesopotamian J. Cybersecur."},{"issue":"5","key":"22_CR12","first-page":"6021","volume":"37","author":"T Hua","year":"2019","unstructured":"Hua, T., Li, L.: Computer network security technology based on artificial intelligence. J. Intell. Fuzzy Syst. 37(5), 6021\u20136028 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"22_CR13","first-page":"1","volume-title":"In 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM)","author":"S Diary","year":"2024","unstructured":"Diary, S., Choudhury, P., Mishra, S., Sharma, V., Rao, D.D., Aderemi, A.P.: Cybersecurity threats detection in intelligent networks using predictive analytics approaches. In: In 2024 4th International Conference on Innovative Practices in Technology and Management (ICIPTM), pp. 1\u20135. IEEE (2024, February)"},{"issue":"1","key":"22_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.54060\/a2zjournals.jase.42","volume":"4","author":"M Thakur","year":"2024","unstructured":"Thakur, M.: Cyber security threats and countermeasures in the digital age. J. Appl. Sci. Educ. 4(1), 1\u201320 (2024)","journal-title":"J. Appl. Sci. Educ."},{"issue":"10","key":"22_CR15","doi-asserted-by":"publisher","first-page":"10200","DOI":"10.1088\/1742-6596\/1260\/10\/102007","volume":"1260","author":"AV Kabulov","year":"2019","unstructured":"Kabulov, A.V., Normatov, I.H., Ashurov, A.O.: Computational methods of minimization of multiple functions. J. Phys. Conf. Ser. 1260(10), 10200 (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1260\/10\/102007","journal-title":"J. Phys. Conf. Ser."},{"issue":"10","key":"22_CR16","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1260\/10\/102006","volume":"1260","author":"AV Kabulov","year":"2019","unstructured":"Kabulov, A.V., Normatov, I.H.: About problems of decoding and searching for the maximum upper zero of discrete monotone functions. J. Phys. Conf. Ser. 1260(10), 102006 (2019). https:\/\/doi.org\/10.1088\/1742-6596\/1260\/10\/102006","journal-title":"J. Phys. Conf. Ser."},{"issue":"3","key":"22_CR17","first-page":"317","volume":"26","author":"AM Al-Hawamleh","year":"2024","unstructured":"Al-Hawamleh, A.M.: Investigating the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: evidence from the KSA. Dig. Policy Regul. Govern. 26(3), 317\u2013336 (2024)","journal-title":"Dig. Policy Regul. Govern."},{"issue":"1","key":"22_CR18","doi-asserted-by":"publisher","first-page":"122","DOI":"10.26577\/JMMCS2024121112","volume":"121","author":"I Saymanov","year":"2024","unstructured":"Saymanov, I.: Logical automatic implementation of steganographic coding algorithms. J. Math. Mech. Comput. Sci. 121(1), 122\u2013131 (2024). https:\/\/doi.org\/10.26577\/JMMCS2024121112","journal-title":"J. Math. Mech. Comput. Sci."},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IEMTRONICS55184.2022.9795850","volume-title":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada","author":"A Kabulov","year":"2022","unstructured":"Kabulov, A., Saymanov, I., Yarashov, I., Karimov, A.: Using algorithmic modeling to control user access based on functioning table. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, pp. 1\u20135 (2022). https:\/\/doi.org\/10.1109\/IEMTRONICS55184.2022.9795850"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30258-9_9","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022","author":"GU Juraev","year":"2023","unstructured":"Juraev, G.U., Kuvonchbek, R., Toshpulov, B.: Application fuzzy neural network methods to detect cryptoattacks on financial information systems based on blockchain technology. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022 Lecture Notes in Computer Science, vol. 13772. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30258-9_9"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60994-7_19","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2023 2023","author":"R Kuvonchbek","year":"2024","unstructured":"Kuvonchbek, R., Arzieva, J.T., Arziev, A.: Designing the UzBCS lending platform network based on Blockchain technology and ensure transaction security. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2023 2023 Lecture Notes in Computer Science, vol. 14542. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-60994-7_19"},{"key":"22_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30258-9_10","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022","author":"R Kuvonchbek","year":"2023","unstructured":"Kuvonchbek, R.: Method authentication of objects information communication. In: Koucheryavy, Y., Aziz, A. (eds.) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022 Lecture Notes in Computer Science, vol. 13772. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30258-9_10"},{"issue":"2","key":"22_CR23","first-page":"741","volume":"2","author":"G Juraev","year":"2023","unstructured":"Juraev, G., Abdullaev, T.R., Rakhimberdiev, K., Bozorov, A.X.: Mathematical modelling of key generators for bank lending platforms based on blockchain technology. Artif. Intell. Blockchain Comput. Sec. 2(2), 741\u2013749 (2023)","journal-title":"Artif. Intell. Blockchain Comput. Sec."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95299-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T01:11:06Z","timestamp":1757293866000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95299-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,27]]},"ISBN":["9783031952982","9783031952999"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95299-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,27]]},"assertion":[{"value":"27 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ruSMART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Internet of Things and Smart Spaces","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rusmart2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/new2an.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}