{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:53Z","timestamp":1773655553763,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080121","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1012-1016","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"V. M.","family":"Krundyshev","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7210_CR1","unstructured":"Annenkov, M., Basics of cyber resistance in the financial market, Bezop. Delovoi Inf., Kiberustoich., 2017, no. 17."},{"key":"7210_CR2","unstructured":"Akinin, A., Cyber resistance: The command of our times, Bezop. Delovoi Inf., Kiberustoich., 2017, no. 17."},{"key":"7210_CR3","first-page":"1793","volume":"2","author":"P. Bhattacharjee","year":"2010","unstructured":"Bhattacharjee, P., Artificial intelligence based authentication technique with three attributes in vehicular ad hoc network, Int. J. Comput. Theory Eng., 2010, vol. 2, no. 3, pp. 1793\u20131802.","journal-title":"Int. J. Comput. Theory Eng."},{"key":"7210_CR4","doi-asserted-by":"crossref","unstructured":"Lei, J. and Ghorbani, A., Network intrusion detection using an improved competitive learning neural network, Proceeding of the Second Annual Conference on Communication Networks and Services Research, 2004.","DOI":"10.1109\/DNSR.2004.1344728"},{"key":"7210_CR5","doi-asserted-by":"crossref","unstructured":"Subba, B., Biswas, S., and Karmakar, S., A neural network based system for intrusion detection and attack classification, Proceeding of the Twenty Second National Conference on Communication (NCC), 2016.","DOI":"10.1109\/NCC.2016.7561088"},{"key":"7210_CR6","unstructured":"NS-3 Open source network simulator. https:\/\/www.nsnam.org\/. Accessed June 5, 2019."},{"key":"7210_CR7","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.procs.2017.05.391","volume":"109","author":"A. AlDairi","year":"2017","unstructured":"AlDairi, A. and Tawalbeh, L., Cyber security attacks on smart cities and associated mobile technologies, Procedia Comput. Sci., 2017, vol. 109, pp. 1086\u20131091.","journal-title":"Procedia Comput. Sci."},{"key":"7210_CR8","doi-asserted-by":"crossref","unstructured":"Wallgren, L., Raza, S., and Voigt, T., Routing attacks and countermeasures in the RPL-based internet of things, Int. J. Distrib. Sensor Networks, 2013, vol. 2013.","DOI":"10.1155\/2013\/794326"},{"key":"7210_CR9","unstructured":"KDD Cup 1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed June 5, 2019."},{"key":"7210_CR10","unstructured":"DARPA intrusion detection evaluation. https:\/\/www.ll.mit.edu\/r-d\/datasets\/1999-darpa-intrusion-detection-evaluation-dataset. Accessed June 5, 2019."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080121.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080121","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080121.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:17Z","timestamp":1773612017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7210"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080121","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"3 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}