{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:54:07Z","timestamp":1773615247975,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080078","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"948-953","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things"],"prefix":"10.3103","volume":"53","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7201_CR1","doi-asserted-by":"crossref","unstructured":"Stouffer, K., Pillitteri, V., and Lightman, S., Guide to industrial control systems (ICS) security, NIST Special Publication 800\u201382 rev. 2, 2015.","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"7201_CR2","unstructured":"Vasil'ev, Yu.S., Zegzhda, P.D., and Zegzhda, D.P., Ensuring the safety of automated process control systems at hydropower facilities, Izv. Ross. Akad. Nauk, Energetika, 2016, no. 3, pp. 49\u201361."},{"key":"7201_CR3","doi-asserted-by":"crossref","unstructured":"Voas, J., Network of \u201cThings,\u201d NIST Special Publication 800\u2013183, 2016.","DOI":"10.6028\/NIST.SP.800-183"},{"key":"7201_CR4","unstructured":"Zegzhda, D.P., Moskvin, D.A., and Dakhnovich, A.D., Analysis of threats to information security in digital production networks, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2017, no. 4, pp. 41\u201346."},{"key":"7201_CR5","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3103\/S0146411618080254","volume":"52","author":"Yu.S. Vasil'ev","year":"2018","unstructured":"Vasil'ev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090\u20131100.","journal-title":"Autom. Control Comput. Sci."},{"key":"7201_CR6","unstructured":"Ross, M., Hannes, T., and Jara, A., Baseline security recommendations for IoT in the context of Critical Information Infrastructures, 2017. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot\/at_download\/fullReport. Accessed January 21, 2019."},{"key":"7201_CR7","unstructured":"Lin, S., Crawford, M., and Mellor, S., The Industrial Internet of Things Volume G1: Reference Architecture. https:\/\/www.iiconsortium.org\/IIC_PUB_G1_V1.80_2017-01-31.pdf. Accessed February 19, 2019."},{"key":"7201_CR8","volume-title":"Secure Information Sharing in an Industrial Internet of Things","author":"N. Ulltveit-Moe","year":"2016","unstructured":"Ulltveit-Moe, N., Nergaard, H., Erdodi, L., Gj\u00f8s\u00e6ter, T., Kolstad, E., and Berg, P., Secure Information Sharing in an Industrial Internet of Things, University of Agder, 2016."},{"key":"7201_CR9","unstructured":"Positive Research 2018. Collection of studies on practical safety. 2018. https:\/\/www.ptsecurity.com\/upload\/corporate\/ru-ru\/analytics\/Positive-Research-2018-rus.pdf. Accessed January 21, 2019."},{"key":"7201_CR10","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.3103\/S0146411618080060","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Zegzhda, D.P., and Moskvin, D.A., Applying garlic routing to guarantee secure collaboration of segments in a digital manufacturing network, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1127\u20131133.","journal-title":"Autom. Control Comput. Sci."},{"key":"7201_CR11","unstructured":"Stepanova, T.V., Zegzhda, D.P., Vasil\u2019ev, Yu.S., and Zegzhda, P.D., Ensuring the technological independence of the Russian Federation in the field of cybersecurity, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2014, no. 4, pp. 17\u201329."},{"issue":"8","key":"7201_CR12","doi-asserted-by":"publisher","first-page":"947","DOI":"10.3103\/S014641161708003X","volume":"51","author":"E. B. Aleksandrova","year":"2017","unstructured":"Aleksandrova, E.B., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, no. 51, pp. 947\u2013958.","journal-title":"Automatic Control and Computer Sciences"},{"key":"7201_CR13","volume-title":"Architecture and Components of Secure and Anonymous Peer-to-Peer Systems","author":"H. Niedermayer","year":"2010","unstructured":"Niedermayer, H., Architecture and Components of Secure and Anonymous Peer-to-Peer Systems, Technical University Munich, 2010."},{"key":"7201_CR14","unstructured":"Kalinin, M.O. and Zubkov, E.A., Prevention of attacks against dynamic routing in self-organizing peer-to-peer networks using swarm intelligence, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 1, pp. 89\u201396."},{"key":"7201_CR15","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673\u2013681.","journal-title":"Autom. Control Comput. Sci."},{"key":"7201_CR16","doi-asserted-by":"crossref","unstructured":"Zegzhda, D.P., Vasil\u2019ev, Yu.S., Poltavtseva, M.A., Kefeli, I.F., and Borovkov, A.I., Cybersecurity of progressive production technologies in the era of digital transformation, Vopr. Kiberbezop., 2018, no. 2, pp. 2\u201315.","DOI":"10.21681\/2311-3456-2018-2-2-15"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080078.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080078","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080078.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:57:21Z","timestamp":1773611841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7201"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080078","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"11 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}