{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:41:40Z","timestamp":1773654100298,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319231259","type":"print"},{"value":"9783319231266","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23126-6_1","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T13:20:51Z","timestamp":1439385651000},"page":"3-10","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Monitoring of Information Security of Remote Devices of Wireless Networks"],"prefix":"10.1007","author":[{"given":"Ilya","family":"Lebedev","sequence":"first","affiliation":[]},{"given":"Viktoria","family":"Korzhuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"2732","DOI":"10.3390\/s140202732","volume":"14","author":"P Kumar","year":"2014","unstructured":"Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Networks-based Applications. MDPI Sensors 14(2), 2732\u20132755 (2014)","journal-title":"MDPI Sensors"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, Mo.: Multi agent simulation using discrete event and soft-computing methodologies. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 1711\u20131716 (2003)","DOI":"10.1109\/ICSMC.2003.1244659"},{"key":"1_CR3","unstructured":"Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85\u2013101 (2004)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Peters, J.F.: Approximation spaces for hierarchical intelligent behavioral system models. Advances in Soft Computing (28), 13\u201330 (2005)","DOI":"10.1007\/3-540-32370-8_2"},{"key":"1_CR5","unstructured":"Zikratov, I.A., Kozlova, E.V., Stratowa, T.V.: The analysis of vulnerabilities of robotic systems with swarm intelligence. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 5(87), 149\u2013154 (2013)"},{"key":"1_CR6","unstructured":"Gvozdev, V.A., Zikratov, I.A., Lebedev, I.S., Lapshin, S.V., Solov\u2019ev, I.N.: Prognostic evaluation of software architectures security. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 4(80), 126\u2013130 (2012)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-319-10353-2_10","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems","author":"IA Zikratov","year":"2014","unstructured":"Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and Reputation Mechanisms for Multi-agent Robotic Systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN\/ruSMART 2014. LNCS, vol. 8638, pp. 106\u2013120. Springer, Heidelberg (2014)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), art. no. 6504448, 80\u201386 (2013)","DOI":"10.1109\/MM.2013.18"},{"key":"1_CR9","unstructured":"Bobtsov, A., Nikiforov, V.O.: Adaptive output control: tasks, applied problems and solutions. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 1(83). S.1\u2013S.14 (2013)"},{"key":"1_CR10","unstructured":"Maltsev, G.N., Dzhumkov, V.V.: A generalized model of a discrete communication channel with grouping errors. Information and Control Systems 1, 27\u201333 (2013)"},{"key":"1_CR11","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-81-322-0740-5_24","volume-title":"Proceedings of International Conference on Advances in Computing","author":"M Prabhakar","year":"2013","unstructured":"Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash Equilibrium and Marcov Chains to Enhance Game Theoretic Approach for Vanet Security. In: Aswatha Kumar, M., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191\u2013199. Springer, Heidelberg (2013)"},{"key":"1_CR12","unstructured":"Komov, S. A. and others: Terms and definitions in the field of information security. \u2013 M., AC-trust, 2009. -304 S."},{"key":"1_CR13","unstructured":"Koval, E.N., Lebedev, I.S.: Total security model of the robotic systems. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 4(86) S.153\u2013S.154 (2013)"},{"key":"1_CR14","unstructured":"Zikratov, I.S., Stratowa, T.V., Lebedev, I.S., Gurtov, V.A.: Building a Model of trust and reputation to the objects of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 3(91), 30\u201339 (2014)"},{"key":"1_CR15","unstructured":"Shago, F.N., Zikratov, I.A.: The optimization system of planning of audit of information security management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2(90), 111\u2013118 (2014)"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23126-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T23:50:27Z","timestamp":1748562627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23126-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319231259","9783319231266"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23126-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}