{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:46Z","timestamp":1773615886618,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080169","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"870-873","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers"],"prefix":"10.3103","volume":"53","author":[{"given":"V. A.","family":"Lokhvitskii","sequence":"first","affiliation":[]},{"given":"A. D.","family":"Khomonenko","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Bol\u2019shakov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7190_CR1","unstructured":"Tsvetkov, V.Ya., Control using cyber-physical systems, Perspekt. Nauki Obraz., 2017, no. 3, pp. 55\u201360."},{"key":"7190_CR2","doi-asserted-by":"crossref","unstructured":"Teilans, A.A., Romanov, A.V., Merkur\u2019ev, Yu.A., Dorogov, P.P., Kleins, A.Ya., and Potryasaev, S.A., Risk assessment in cyberphysical systems using domain modeling and simulation modeling, Tr. S.-Peterb. Inst. Inf. Avtom. Ross. Akad., 2018, no. 59, pp. 115\u2013139.","DOI":"10.15622\/sp.59.5"},{"key":"7190_CR3","unstructured":"Yusupov, R.M. and Pal\u2019chun, B.P., Security of the computer infosphere of critical application systems, Vooruzhenie, Polit., Konvers., 1993, no. 3, pp. 23\u201331."},{"key":"7190_CR4","doi-asserted-by":"crossref","unstructured":"Markov, A.S. and Tsirlov, V.L., Cybersecurity guidelines in the context of ISO 27032, Vopr. Kiberbezop., 2014, no. 1, pp. 28\u201335.","DOI":"10.21681\/2311-3456-2014-1-28-35"},{"key":"7190_CR5","unstructured":"Petrenko, S.A. and Stupin, D.D., Natsional\u2019naya sistema rannego preduprezhdeniya o komp\u2019yuternom napadenii: Nauchnaya monografiya (The National Early Warning System for Computer Attacks: Scientific Monograph), Boev, S.F., Ed., Innopolis: Izd. Dom Afina, 2017."},{"key":"7190_CR6","unstructured":"Biryukov, D.N. and Lomako, A.G., An approach to building a cyber threat prevention system, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2013, no. 2, pp. 13\u201319."},{"key":"7190_CR7","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2017, no. 3, p. 9\u201322."},{"key":"7190_CR8","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3103\/S0146411617080260","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805\u2013816.","journal-title":"Autom. Control Comput. Sci."},{"key":"7190_CR9","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3103\/S0146411617080272","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835\u2013843.","journal-title":"Autom. Control Comput. Sci."},{"key":"7190_CR10","unstructured":"Khazaei, H., Perfomance Modeling of Cloud Computing Centers, Winnipeg, Manitoba: The Univercity of Manitoba, 2012."},{"key":"7190_CR11","unstructured":"Kalinin, V.N., Teoreticheskie osnovy sistemnykh issledovanii: Uchebnik (Theoretical Foundations of Systems Research: Textbook), St. Petersburg: Voen.-Kosm. Akad. im. A. F. Mozhaiskogo, 2016."},{"key":"7190_CR12","unstructured":"Sokolov, I.A., Kupriyanovskii, V.P., Namiot, D.E., Sukhomlin, V.A., Pokusaev, O.N., Lavrov, A.I., and Volokitin, Yu.I., Currrent research projects of the EU and the ontology of digital security in Europe, Int. J. Open Inf. Technol., 2018, vol. 6, no. 4."},{"key":"7190_CR13","unstructured":"Baranovskii, A.M. and Khomonenko, A.D., Assessment of information risks of transport security, Professional\u2019noe obrazovanie, nauka i innovatsii v XXI veke. Sbornik trudov X Sankt-Peterburgskogo kongressa (Vocational Education, Science, and Innovation in the 21st Century. Proceedings of the 10th St. Petersburg Congress), St.\u00a0Petersburg, 2016, pp. 33\u201338."},{"key":"7190_CR14","unstructured":"Adadurov, S.E., Kalinichenko, S.V., Lokhvitskii, V.A., Khomonenko, A.D., and Yakovlev, V.V., A model for evaluating the efficiency of cloud computing taking into account virtualization and information security, Izv. Tul. Gos. Univ., Tekh. Nauki, 2017, no. 9-1, pp. 233\u2013245."},{"key":"7190_CR15","unstructured":"Okhtilev, M.Yu., Sokolov, B.V., and Yusupov, R.M., Intellektual\u2019nye tekhnologii monitoringa i upravleniya strukturnoi dinamikoi slozhnykh tekhnicheskikh ob\u201dektov (Intelligent Technologies for Monitoring and Controlling the Structural Dynamics of Complex Technical Objects), Moscow: Nauka, 2006."},{"key":"7190_CR16","first-page":"11","volume":"10","author":"K.E. Legkov","year":"2016","unstructured":"Legkov, K.E., Models and methods for monitoring parameters characterizing the state of the special-purpose infocommunication system, T-Comm:Telekommun. Transp., 2016, vol. 10, no. 1, pp. 11\u201318.","journal-title":"Telekommun. Transp."},{"key":"7190_CR17","unstructured":"Moshkin, V.S. and Yarushkina, N.G., The system of ontological analysis of time series, Avtom. Protsess. Upr., 2014, no. 2, pp. 78\u201385."},{"key":"7190_CR18","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673\u2013681.","journal-title":"Autom. Control Comput. Sci."},{"key":"7190_CR19","doi-asserted-by":"crossref","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, Proceedings of the 9th International Conference on Security of Information and Networks, SIN 2016, 2016, pp. 81\u201387.","DOI":"10.1145\/2947626.2947639"},{"key":"7190_CR20","volume-title":"Big Data. A Revolution That Will Transform How We Live, Work and Think","author":"V. Mayer-Sch\u00f6nberger","year":"2013","unstructured":"Mayer-Sch\u00f6nberger, V. and Cukier, K., Big Data. A Revolution That Will Transform How We Live, Work and Think, Houghton Mifflin Harcourt, 2013."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080169.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080169","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080169.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:24Z","timestamp":1773612384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7190"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080169","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"8 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}