{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:12Z","timestamp":1773655752065,"version":"3.50.1"},"reference-count":7,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080236","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1017-1019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Model of Cyberattacks on Digital Production Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7211_CR1","unstructured":"How Does Smart Factory Work. https:\/\/iot.ru\/promyshlennost\/kak-ustroen-umnyy-zavod."},{"key":"7211_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-39429-9_1","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"Ronny Seiger","year":"2016","unstructured":"Seiger, R., Huber, S., Heisig, P., and Assmann, U., Enabling self-adaptive workflows for cyber-physical systems, Lect. Notes Bus. Inf. Process., 2016, no. 248. https:\/\/doi.org\/10.1007\/978-3-319-39429-9_1"},{"key":"7211_CR3","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3103\/S0146411617080272","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835\u2013843. https:\/\/doi.org\/10.3103\/S0146411617080272","journal-title":"Autom. Control Comput. Sci."},{"key":"7211_CR4","volume-title":"Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, 2019 IEEE Industrial Cyber-Physical Systems","author":"E. Pavlenko","year":"2019","unstructured":"Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, 2019 IEEE Industrial Cyber-Physical Systems(ICPS), 2019."},{"key":"7211_CR5","volume-title":"Lightweight Cryptography for the Internet of Things","author":"M. Katagi","year":"2008","unstructured":"Katagi, M. and Shiho, M., Lightweight Cryptography for the Internet of Things, Sony Corporation, 2008, pp. 7\u201310."},{"key":"7211_CR6","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S014641161808028X","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936\u2013944. https:\/\/doi.org\/10.3103\/S014641161808028X","journal-title":"Autom. Control Comput. Sci."},{"key":"7211_CR7","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81\u201387. https:\/\/doi.org\/10.1145\/2947626.29476392","DOI":"10.1145\/2947626.29476392"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080236.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080236","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080236.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:12Z","timestamp":1773612432000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":7,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7211"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080236","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"5 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}