{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:01:26Z","timestamp":1773655286008,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.3103\/s0146411618080151","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T10:50:13Z","timestamp":1551955813000},"page":"912-917","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series"],"prefix":"10.3103","volume":"52","author":[{"given":"M. O.","family":"Kalinin","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Yarmak","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"7060_CR1","doi-asserted-by":"crossref","unstructured":"Vasil\u2019ev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Ensuring the safety of automated process control systems in hydropower facilities, Izv. Ross. Akad. Nauk, Ser. Energ., 2016, no. 3.","DOI":"10.1134\/S0040601516130073"},{"key":"7060_CR2","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comp. Sci., 2016, vol. 50, p. 673. https:\/\/doi.org\/10.3103\/S0146411616080125","journal-title":"Autom. Control Comp. Sci."},{"key":"7060_CR3","doi-asserted-by":"crossref","unstructured":"Tulone, D. and Madden, S., PAQ: Time series forecasting for approximate query answering in sensor networks, in European Workshop on Wireless Sensor Networks, Berlin, Heidelberg: Springer, 2006, pp. 21\u201337.","DOI":"10.1007\/11669463_5"},{"key":"7060_CR4","first-page":"237","volume":"5","author":"L. Wei","year":"2005","unstructured":"Wei, L., et al., Assumption-free anomaly detection in time series, SSDBM, 2005, vol. 5, pp. 237\u2013242.","journal-title":"SSDBM"},{"key":"7060_CR5","first-page":"2","volume":"24","author":"B. Pincombe","year":"2005","unstructured":"Pincombe, B., Anomaly detection in time series of graphs using arma processes, Asor Bull., 2005, vol. 24, no. 4, p. 2.","journal-title":"Asor Bull."},{"key":"7060_CR6","doi-asserted-by":"crossref","unstructured":"Hundman, K., et al., Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding, arXiv preprint arXiv:1802.04431, 2018.","DOI":"10.1145\/3219819.3219845"},{"key":"7060_CR7","unstructured":"Filonov, P., Lavrentyev, A., and Vorontsov, A., Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model, arXiv preprint arXiv:1612.06676, 2016."},{"key":"7060_CR8","doi-asserted-by":"crossref","unstructured":"Nanduri, A. and Sherry, L., Anomaly detection in aircraft data using Recurrent Neural Networks (RNN), Integrated Communications Navigation and Surveillance (ICNS), 2016, pp. 5C2-1\u20135C2-8.","DOI":"10.1109\/ICNSURV.2016.7486356"},{"key":"7060_CR9","unstructured":"Yi, S., et al., Grouped convolutional neural networks for multivariate time series, arXiv preprint arXiv:1703.09938, 2017."},{"key":"7060_CR10","unstructured":"Supercomputer Center Polytechnic. https:\/\/www.scc.spbstu.ru."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080151.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411618080151","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080151.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:59:27Z","timestamp":1773611967000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411618080151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["7060"],"URL":"https:\/\/doi.org\/10.3103\/s0146411618080151","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"12 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}