{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:49Z","timestamp":1773655669732,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080030","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"954-962","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Benford\u2019s Law in the Detection of DoS Attacks on Industrial Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"E. B.","family":"Aleksandrova","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]},{"given":"A. V.","family":"Yarmak","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7202_CR1","doi-asserted-by":"crossref","unstructured":"Zegzhda, D.P., Vasil\u2019ev, Yu.S., Poltavtseva, M.A., Kefeli, I.F., and Borovkov, A.I., Cybersecurity of progressive production technologies in the era of digital transofrmation, Vopr. Kiberbezop., 2018, no. 2, pp. 2\u201315.","DOI":"10.21681\/2311-3456-2018-2-2-15"},{"key":"7202_CR2","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3103\/S0146411618080254","volume":"52","author":"Yu.S. Vasil\u2019ev","year":"2018","unstructured":"Vasil\u2019ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090\u20131100.","journal-title":"Autom. Control Comput. Sci."},{"key":"7202_CR3","unstructured":"Industroyer: Biggest malware threat to critical infrastructure since Stuxnet. https:\/\/www.eset.com\/int\/industroyer\/. Accessed January 28, 2019."},{"key":"7202_CR4","unstructured":"The New Threat: IoT DDoS Invasion. https:\/\/www.a10networks.com\/resources\/infographics\/new-threat-iot-ddos-invasion. Accessed January 28, 2019."},{"key":"7202_CR5","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0098-1354(93)80018-I","volume":"17","author":"J.J. Downs","year":"1993","unstructured":"Downs, J.J. and Vogel, E.F., A plant-wide industrial process control problem, Comput. Chem. Eng., 1993, vol.\u00a017, no. 3, pp. 245\u2013255.","journal-title":"Comput. Chem. Eng."},{"key":"7202_CR6","unstructured":"Filonov, P., Kitashov, F., and Lavrentyev, A., RNN-based early cyber-attack detection for the Tennessee Eastman process, arXiv preprint arXiv:1709.02232, 2017."},{"key":"7202_CR7","first-page":"551","volume":"78","author":"F. Benford","year":"1938","unstructured":"Benford, F., The law of anomalous numbers, Proc. Am. Philos. Soc., 1938, vol. 78, no. 4, pp. 551\u2013572.","journal-title":"Proc. Am. Philos. Soc."},{"key":"7202_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1214\/ss\/1177009869","volume":"10","author":"T.P. Hill","year":"1995","unstructured":"Hill, T.P., et al., A statistical derivation of the significant-digit law, Stat. Sci., 1995, vol. 10, no. 4, pp. 354\u2013363.","journal-title":"Stat. Sci."},{"key":"7202_CR9","unstructured":"Benford Online Bibliography. http:\/\/www.benfordonline.net\/list\/chronological\/. Accessed January 30, 2019."},{"key":"7202_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/9781118386798","volume-title":"Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations","author":"M.J. Nigrini","year":"2011","unstructured":"Nigrini, M.J., Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations, John Wiley & Sons, 2011."},{"key":"7202_CR11","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917.","journal-title":"Autom. Control Comput. Sci."},{"key":"7202_CR12","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 2, pp. 48\u201358."},{"key":"7202_CR13","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S014641161808028X","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936\u2013944.","journal-title":"Autom. Control Comput. Sci."},{"key":"7202_CR14","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2017, no. 3, p. 9\u201322."},{"key":"7202_CR15","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3103\/S0146411617080260","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805\u2013816.","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080030.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080030","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080030.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:55:57Z","timestamp":1773611757000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7202"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080030","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"14 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}