{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:57:31Z","timestamp":1773615451421,"version":"3.50.1"},"reference-count":4,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080248","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1020-1022","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model"],"prefix":"10.3103","volume":"53","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7212_CR1","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.3103\/S0146411618080333","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150\u20131159. https:\/\/doi.org\/10.3103\/S0146411618080333","journal-title":"Autom. Control Comput. Sci."},{"key":"7212_CR2","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1016\/j.protcy.2016.08.038","volume":"26","author":"Dirk Lehmhus","year":"2016","unstructured":"Lehmhus, D., Aumund-Kopp, C., Petzoldt, F., Godlinski, D., Haberkorn, A., Zollmer, V., and Busse, M., Customized smartness: A survey on links between additive manufacturing and sensor integration, Procedia Technol., 2016, vol. 26, pp. 284-301. https:\/\/doi.org\/10.1016\/j.protcy.2016.08.038","journal-title":"Procedia Technology"},{"issue":"2","key":"7212_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/jsan7020023","volume":"7","author":"Antonio Calder\u00f3n Godoy","year":"2018","unstructured":"Calder\u00f3n Godoy, A.J. and Gonz\u00e1lez P\u00e9rez, I., Integration of sensor and actuator networks and the SCADA system to promote the migration of the legacy flexible manufacturing system towards the Industry 4.0 concept, J.\u00a0Sensor Actuator Networks, 2018, vol. 7, no. 2. https:\/\/doi.org\/10.3390\/jsan7020023","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"7212_CR4","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81\u201387. https:\/\/doi.org\/10.1145\/2947626.2947639","DOI":"10.1145\/2947626.2947639"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080248.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080248","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080248.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:00:05Z","timestamp":1773612005000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":4,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7212"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080248","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"5 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}