{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:55:50Z","timestamp":1773615350921,"version":"3.50.1"},"reference-count":14,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s014641161908011x","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1006-1011","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks"],"prefix":"10.3103","volume":"53","author":[{"given":"V. M.","family":"Krundyshev","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7209_CR1","unstructured":"Zegzhda, D.P. and Ivashko, A.M., Osnovy informatsionnoi bezopasnosti informatsionnykh sistem (Fundamentals of Information Security of Information Systems), Goryachaya liniya\u2014Telekom, 2000."},{"key":"7209_CR2","doi-asserted-by":"publisher","first-page":"735","DOI":"10.3103\/S0146411615080283","volume":"49","author":"D. Lavrova","year":"2015","unstructured":"Lavrova, D., Pechenkin, A., and Gluhov, V., Applying correlation analysis methods to control flow violation detection in the internet of things, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 735\u2013740.","journal-title":"Autom. Control Comput. Sci."},{"key":"7209_CR3","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","volume":"14","author":"E. Sisinni","year":"2018","unstructured":"Sisinni, E., et al., Industrial Internet of Things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 2018, vol. 14, no. 11, pp. 4724\u20134734.","journal-title":"IEEE Trans. Ind. Inf."},{"key":"7209_CR4","doi-asserted-by":"crossref","unstructured":"Singh, R. and Nand, P., Literature review of routing attacks in MANET, 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 525\u2013530.","DOI":"10.1109\/CCAA.2016.7813776"},{"key":"7209_CR5","doi-asserted-by":"crossref","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proceedings of the 11th International Conference on Security of Information and Networks, 2018.","DOI":"10.1145\/3264437.3264479"},{"key":"7209_CR6","volume-title":"Securing wsn networks using the trust model, Regional\u2019naya informatika i informatsionnaya bezopasnost","author":"T.D. Ovasapyan","year":"2017","unstructured":"Ovasapyan, T.D., Ivanov, D.V., and Zegzhda, D.P., Securing wsn networks using the trust model, Regional\u2019naya informatika i informatsionnaya bezopasnost\u2019 (Regional Informatics and Information Security), 2017, pp.\u00a0421\u2013422."},{"key":"7209_CR7","volume-title":"Neural Networks: A Comprehensive Foundation","author":"S.S. Haykin","year":"1999","unstructured":"Haykin, S.S., Neural Networks: A Comprehensive Foundation, Prentice Hall, 1999."},{"key":"7209_CR8","doi-asserted-by":"publisher","first-page":"907","DOI":"10.3103\/S0146411617080120","volume":"51","author":"M.O. Kalinin","year":"2017","unstructured":"Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907\u2013914.","journal-title":"Autom. Control Comput. Sci."},{"key":"7209_CR9","unstructured":"NS-3. http:\/\/www.nsnam.org\/."},{"key":"7209_CR10","unstructured":"Karmanov, M.L., Routing protocol for ad hoc networks, Vestn. Yuzhno-Ural. Gos. Univ., Ser.: Komp\u2019yut. Tekhnol. Upr. Radioelektron., 2009, no. 10, pp. 47\u201351."},{"key":"7209_CR11","unstructured":"Keras. https:\/\/keras.io\/."},{"key":"7209_CR12","unstructured":"Tensorflow. https:\/\/www.tensorflow.org\/."},{"key":"7209_CR13","unstructured":"Deeplearning4j. https:\/\/deeplearning4j.org\/."},{"key":"7209_CR14","unstructured":"Theano. http:\/\/www.deeplearning.net\/software\/theano\/."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161908011X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641161908011X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161908011X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:42Z","timestamp":1773611922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641161908011X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7209"],"URL":"https:\/\/doi.org\/10.3103\/s014641161908011x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"4 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}