{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:53:31Z","timestamp":1773615211970,"version":"3.50.1"},"reference-count":11,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080339","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"972-979","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series"],"prefix":"10.3103","volume":"53","author":[{"given":"D. P.","family":"Zegzhda","sequence":"first","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]},{"given":"M. V.","family":"Levykin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7205_CR1","first-page":"69","volume":"21","author":"M.V. Levykin","year":"2011","unstructured":"Levykin, M.V., New features of self-propagating malware, Sist. Sredstva Inf., 2011, vol. 21, no. 2, pp. 69\u201372.","journal-title":"Sist. Sredstva Inf."},{"key":"7205_CR2","unstructured":"The RPC Model. The RPC programming model in the official MSDN documentation. https:\/\/docs.microsoft.com\/ en-us\/windows\/desktop\/Rpc\/microsoft-rpc-model."},{"key":"7205_CR3","unstructured":"Authentication-Level Constants. Description of RPC levels in the official MSDN documentation. https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/rpc\/authentication-level-constants."},{"key":"7205_CR4","unstructured":"RPC_IF_CALLBACK_FN callback function. Procedure callback function that implements data security checks. https:\/\/docs.microsoft.com\/ru-ru\/windows\/desktop\/api\/rpcdce\/nc-rpcdce-rpc_if_callback_fn."},{"key":"7205_CR5","unstructured":"BadLock attack description. https:\/\/adsecurity.org\/?p=2812."},{"key":"7205_CR6","unstructured":"Siering, P., Badlock\u2014Why the Windows and Samba Vulnerability is Important. https:\/\/www.heise.de\/ct\/artikel\/ Badlock-Why-the-Windows-and-Samba-Vulnerability-is-Important-3175176.html."},{"key":"7205_CR7","unstructured":"Impacket Framework. Impacket Source Code. https:\/\/github.com\/SecureAuthCorp\/impacket."},{"key":"7205_CR8","unstructured":"SpoolSample Utility. SpoolSample Source Code. https:\/\/github.com\/leechristensen\/SpoolSample."},{"key":"7205_CR9","unstructured":"NetNTLMtoSilverTicket Utility. Source Code. https:\/\/github.com\/NotMedic\/NetNTLMtoSilverTicket."},{"key":"7205_CR10","first-page":"39","volume":"12","author":"A.A. Grusho","year":"2018","unstructured":"Grusho, A.A., Grusho, N.A., Levykin, M.V., and Timonina, E.E., Methods of identifying host capture in distributed metadata-protected computing systems, Inf. Primen., 2018, vol. 12, no. 4, pp. 39\u201343.","journal-title":"Inf. Primen."},{"key":"7205_CR11","unstructured":"LogonTracer Utility. LogonTracer Source Code. https:\/\/github.com\/JPCERTCC\/LogonTracer."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080339.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080339","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080339.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:54Z","timestamp":1773611814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7205"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080339","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"12 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}