{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:04:33Z","timestamp":1773655473070,"version":"3.50.1"},"reference-count":5,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.3103\/s0146411618080369","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T10:50:13Z","timestamp":1551955813000},"page":"1071-1075","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Analysis of the Information Security Threats in the Digital Production Networks"],"prefix":"10.3103","volume":"52","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"7082_CR1","unstructured":"Industrial Internet of Things Volume G4: Security Framework, 2016. http:\/\/www.iiconsortium.org\/pdf\/IIC_ PUB_G4_V1.00_PB-3.pdf. Accessed September 12, 2017."},{"key":"7082_CR2","unstructured":"NIST Current Standards Landscape for Smart Manufacturing Systems, 2016. http:\/\/www.redhat.com\/ cms\/managed-files\/rh-industrial-internet-of-things-iot-iiot-security-intelligent-gateway-whitepaper-f6951kc-201706- en.pdf. Accessed August 30, 2017."},{"key":"7082_CR3","doi-asserted-by":"crossref","unstructured":"Vasil\u2019ev, Yu.S., Zegzhda, P.D., and Zegzhda, D.P., Ensuring the safety of automated process control systems at hydropower facilities, Izv. Ross. Akad. Nauk, Energ., 2016, no. 3.","DOI":"10.1134\/S0040601516130073"},{"key":"7082_CR4","doi-asserted-by":"publisher","first-page":"813","DOI":"10.3103\/S0146411616080253","volume":"50","author":"D.P. Zegzhda","year":"2016","unstructured":"Zegzhda, D.P., Sustainability as a criterion for information security in cyber-physical systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 813\u2013819.","journal-title":"Autom. Control Comput. Sci."},{"key":"7082_CR5","doi-asserted-by":"publisher","first-page":"627","DOI":"10.3103\/S0146411615080192","volume":"49","author":"P.D. Zegzhda","year":"2015","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Stepanova, T.V., Approach to the construction of the generalized functional-semantic cyber security model, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 627\u2013633.","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080369.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411618080369","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080369.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:16Z","timestamp":1773612016000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411618080369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":5,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["7082"],"URL":"https:\/\/doi.org\/10.3103\/s0146411618080369","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"10 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}