{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:55:10Z","timestamp":1773615310442,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080170","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"987-994","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Model for Identifying Cyber Threats to Internet Information Resources"],"prefix":"10.3103","volume":"53","author":[{"given":"I. V.","family":"Luskatov","sequence":"first","affiliation":[]},{"given":"S. V.","family":"Pilkevich","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7207_CR1","first-page":"23","volume":"11","author":"L. Kirichenko","year":"2017","unstructured":"Kirichenko, L., Radivilova, T., and Baranovskii, A., Detection of cyber threats through analysis of social networks, Int. J. Inf. Technol. Knowl., 2017, vol. 11, no. 1, pp. 23\u201348.","journal-title":"Int. J. Inf. Technol. Knowl."},{"key":"7207_CR2","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/S0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Yu., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880.","journal-title":"Autom. Control Comput. Sci."},{"key":"7207_CR3","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/ICPHYS.2018.8390812","volume":"2018","author":"D. Lavrova","year":"2018","unstructured":"Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, Proceedings\u20142018 IEEE Industrial Cyber-Physical Systems, 2018, pp. 818\u2013823. https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390812","journal-title":"IEEE Industrial Cyber-Physical Systems"},{"key":"7207_CR4","doi-asserted-by":"crossref","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN\u201917 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295\u2013298.","DOI":"10.1145\/3136825.3136857"},{"key":"7207_CR5","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1007\/978-3-030-01054-6_88","volume":"868","author":"M. Poltavtseva","year":"2018","unstructured":"Poltavtseva, M. and Zegzhda, P., Heterogeneous semi-structured objects analysis, Adv. Intell. Syst. Comput., 2018, vol. 868, pp. 1259\u20131270. https:\/\/doi.org\/10.1007\/978-3-030-01054-6_88","journal-title":"Adv. Intell. Syst. Comput."},{"key":"7207_CR6","doi-asserted-by":"publisher","first-page":"00044","DOI":"10.1051\/shsconf\/20184400044","volume":"44","author":"Maxim Kalinin","year":"2018","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, IV International Scientific Conference \u201cThe Convergence of Digital and Physical Worlds: Technological, Economic and Social Challenges\u201d (CC-TESC2018), St. Petersburg, 2018. https:\/\/doi.org\/10.1051\/shsconf\/20184400044","journal-title":"SHS Web of Conferences"},{"key":"7207_CR7","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S014641161808028X","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936\u2013944.","journal-title":"Autom. Control Comput. Sci."},{"key":"7207_CR8","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3103\/S0146411617080260","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805\u2013816.","journal-title":"Autom. Control Comput. Sci."},{"key":"7207_CR9","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1177\/0165551508099089","volume":"35","author":"C.C. Yang","year":"2009","unstructured":"Yang, C.C. and Sageman, M., Analysis of terrorist social networks with fractal views, J. Inf. Sci., 2009, vol. 35, no. 3, pp. 299\u2013320.","journal-title":"J. Inf. Sci."},{"issue":"128","key":"7207_CR10","doi-asserted-by":"publisher","first-page":"20161048","DOI":"10.1098\/rsif.2016.1048","volume":"14","author":"Alfredo J. Morales","year":"2017","unstructured":"Morales, A.J., Vavilala, V., Benito, R.M., and Bar-Yam, Y., Global patterns of synchronization in human communications, J. R. Soc. Interface, 2017, vol, 14, no. 128. https:\/\/figshare.com\/collections\/Supplementary_ material_from_Global_patterns_of_synchronization_in_human_communications_\/3694468. Accessed January 29, 2018.","journal-title":"Journal of The Royal Society Interface"},{"key":"7207_CR11","doi-asserted-by":"crossref","unstructured":"Zadeh, L.A., Towards a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic, Fuzzy Sets Syst., 1997, no. 4, pp. 103\u2013111.","DOI":"10.1109\/91.493904"},{"key":"7207_CR12","unstructured":"One ROC Curve and Cutoff Analysis, NCSS Statistical Software. https:\/\/www.NCSS.com\/wp-content\/ themes\/ncss\/pdf\/Procedures\/One_ROC_Curve_and_Cutoff_Analysis.pdf. Accessed October 7, 2017."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080170.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080170","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080170.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:58:14Z","timestamp":1773611894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080170"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7207"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080170","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"18 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}