{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:05:28Z","timestamp":1773615928569,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"5","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.3103\/s0146411619050067","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T07:01:41Z","timestamp":1574060501000},"page":"387-392","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time"],"prefix":"10.3103","volume":"53","author":[{"given":"D. S.","family":"Lavrova","sequence":"first","affiliation":[]},{"given":"E. A.","family":"Zaitseva","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,11,18]]},"reference":[{"key":"7140_CR1","unstructured":"Maheshwari, P., Security issues of cyber physical system: A review, Int. J. Comput. Appl., 2016, no. 1, pp. 7\u201311."},{"key":"7140_CR2","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/JIOT.2017.2703172","volume":"4","author":"A. Humayed","year":"2017","unstructured":"Humayed, A., et al., Cyber-physical systems security\u2014a survey, IEEE Internet of Things J., 2017, vol. 4, no. 6, pp. 1802\u20131831.","journal-title":"IEEE Internet of Things J."},{"key":"7140_CR3","volume-title":"Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems","author":"E.Yu. Pavlenko","year":"2018","unstructured":"Pavlenko, E.Yu. and Zegzhda, D.P., Sustainability of cyber-physical systems in the context of targeted destructive influences, 2018 IEEE Industrial Cyber-Physical Systems(ICPS), 2018, pp. 830\u2013834."},{"key":"7140_CR4","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S014641161808028X","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936\u2013944.","journal-title":"Autom. Control Comput. Sci."},{"key":"7140_CR5","doi-asserted-by":"publisher","first-page":"421","DOI":"10.3103\/S0146411618050115","volume":"52","author":"O.I. Sheluhin","year":"2018","unstructured":"Sheluhin, O.I. and Lukin, I.Y., Network traffic anomalies detection using a fixing method of multifractal dimension jumps in a real-time mode, Autom. Control Comput. Sci., 2018, vol. 52, no. 5, pp. 421\u2013430.","journal-title":"Autom. Control Comput. Sci."},{"key":"7140_CR6","doi-asserted-by":"crossref","unstructured":"Narang, P. and Sikdar, B., Anomaly detection in diurnal CPS monitoring data using a local density approach, 2016 IEEE 24th International Conference on Network Protocols (ICNP), 2016, pp. 1\u20135.","DOI":"10.1109\/ICNP.2016.7785323"},{"key":"7140_CR7","doi-asserted-by":"crossref","unstructured":"Yunfei, L., et al., A framework of cyber-security protection for warship systems, Intelligent Systems Design and Engineering Applications (ISDEA),2015Sixth International Conference on, IEEE, 2015, pp. 17\u201320.","DOI":"10.1109\/ISDEA.2015.14"},{"key":"7140_CR8","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1109\/TSMC.2015.2469688","volume":"46","author":"S. Huang","year":"2016","unstructured":"Huang, S., et al., A general real-time control approach of intrusion response for industrial automation systems, IEEE Trans. Syst. Man Cybern.: Syst., 2016, vol. 46, no. 8, pp. 1021\u20131035.","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"key":"7140_CR9","first-page":"1186","volume":"58","author":"E. Dolatdar","year":"2009","unstructured":"Dolatdar, E., Soleymani, S., and Mozafari, B., A new distribution network reconfiguration approach using a tree model, World Acad. Sci. Eng. Technol., 2009, vol. 58, no. 34, p. 1186.","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"7140_CR10","doi-asserted-by":"crossref","unstructured":"Horr\u00e9, W., Lee, K., Hughes, D., Michiels, S., and Joosen, W., A graph based approach to supporting reconfiguration in wireless sensor networks, 2009 First International Conference on Networks & Communications, IEEE, 2009, pp. 326\u2013331.","DOI":"10.1109\/NetCoM.2009.18"},{"issue":"1","key":"7140_CR11","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/s40565-016-0198-3","volume":"5","author":"Haifeng HONG","year":"2016","unstructured":"Hong, H., Hu, Z., Guo, R., Ma, J., and Tian, J., Directed graph-based distribution network reconfiguration for operation mode adjustment and service restoration considering distributed generation, J. Mod. Power Syst. Clean Energy, 2016, vol. 5, no. 1, pp. p. 142.","journal-title":"Journal of Modern Power Systems and Clean Energy"},{"key":"7140_CR12","doi-asserted-by":"crossref","unstructured":"Sergushichev, A.A., Aleksandrov, A.V., Kazakov, S.V., Tsarev, F.N., and Shalyto, A.A., Combined use of De\u00a0Bruijn graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat., Mekh., Inf., 2013, vol. 13, no. 2-2.","DOI":"10.18500\/1816-9791-2013-13-2-2-51-57"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619050067.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619050067","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619050067.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:23Z","timestamp":1773612443000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619050067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7140"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619050067","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9]]},"assertion":[{"value":"28 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author declares that he has no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}