{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:54Z","timestamp":1773615774335,"version":"3.50.1"},"reference-count":7,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619070241","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T10:02:40Z","timestamp":1583316160000},"page":"851-856","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and Security Analysis of a Fragment of Internet of Things Telecommunication System"],"prefix":"10.3103","volume":"53","author":[{"given":"V. A.","family":"Alexandrov","sequence":"first","affiliation":[]},{"given":"V. A.","family":"Desnitsky","sequence":"additional","affiliation":[]},{"given":"D. Y.","family":"Chaly","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7187_CR1","unstructured":"Morgan, S., Internet Trends: 2007. http:\/\/www.slideshare.net\/rmesquita\/morgan-stanley-technology-internet-trends."},{"key":"7187_CR2","unstructured":"GOST R ISO\/MEK TO 13335-3-2007: Information Technology. Security Methods and Tools. Part 3. Information technology Security Management Methods, 2007. http:\/\/ohranatruda.ru\/ot_biblio\/normativ\/data_normativ\/51\/51065.html."},{"key":"7187_CR3","unstructured":"GOST R ISO\/MEK 13335-1-2006: Security Methods and Tools. Part 1. Concepts and Models for Information and Communications Technology Security Management, 2006. http:\/\/www.gosthelp.ru\/gost\/gost271.html."},{"key":"7187_CR4","volume-title":"Getting Started with Raspberry Pi","author":"M. Richardson","year":"2012","unstructured":"Richardson, M., Wallace, S., and Wallace, S.P., Getting Started with Raspberry Pi, O\u2019Reilly Media, Inc., 2012."},{"key":"7187_CR5","unstructured":"Lutts, M., Programmirovanie na Python (Programming with Python), Simvol-Plyus, 2011, vol. 2."},{"key":"7187_CR6","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1147\/sj.302.0206","volume":"30","author":"D.G. Abraham","year":"1991","unstructured":"Abraham, D.G., Dolan, G.M., and Double, G.P., Transaction security system, IBM Syst. J., 1991, vol. 30, no.\u00a02, pp. 230\u2013243.","journal-title":"IBM Syst. J."},{"key":"7187_CR7","unstructured":"Desnitskii, V.A. and Chechulin, A.A., A generalized intruder model and verification of information and telecommunication systems with integrated devices, Tekh. Nauki Teor. Prakt., 2014, no. 39, pp. 7\u201321."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619070241.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619070241","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619070241.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:25Z","timestamp":1773612265000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619070241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":7,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7187"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619070241","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"4 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}