{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:45Z","timestamp":1773615885484,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080106","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"841-849","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things"],"prefix":"10.3103","volume":"54","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7301_CR1","unstructured":"Schrecker, S., Soroush, H., and Molina, J., Industrial Internet of Things Volume G4: Security Framework, 2016. http:\/\/www.iiconsortium.org\/pdf\/IIC_PUB_G4_V1.00_PB-3.pdf. Accessed February 19, 2019."},{"key":"7301_CR2","doi-asserted-by":"publisher","first-page":"972","DOI":"10.3103\/S0146411619080339","volume":"53","author":"D.P. Zegzhda","year":"2019","unstructured":"Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972\u2013979.","journal-title":"Autom. Control Comput. Sci."},{"key":"7301_CR3","unstructured":"Didler, P., Macias, F., and Harstad, J., Converged Plantwide Ethernet (CPwE) Design and Implementation Guide, 2011. https:\/\/literature.rockwellautomation.com\/idc\/groups\/literature\/documents\/td\/enet-td001_-en-p.pdf. Accessed August 11, 2019."},{"key":"7301_CR4","unstructured":"Obregon, L., Secure Architecture for Industrial Control Systems, 2014. https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/secure-architecture-industrial-control-systems-36327. Accessed September 29, 2019."},{"key":"7301_CR5","doi-asserted-by":"crossref","unstructured":"Stouffer, K., Pillitteri, V., and Lightman, S., Guide to Industrial Control Systems (ICS) Security, SP 800-82 Rev. 2, 2015.","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"7301_CR6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-183","volume-title":"Network of 'Things","author":"J. Voas","year":"2016","unstructured":"Voas, J., Network of 'Things', \n               SP 800-183, 2016."},{"key":"7301_CR7","unstructured":"Time-Sensitive Networking: A Technical Introduction, Cisco Public White Paper, 2017. https:\/\/www.cisco.com\/ c\/dam\/en\/us\/solutions\/collateral\/industry-solutions\/white-paper-c11-738950.pdf. Accessed March 12, 2019."},{"key":"7301_CR8","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673\u2013681.","journal-title":"Autom. Control Comput. Sci."},{"key":"7301_CR9","doi-asserted-by":"crossref","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, ACM International Conference Proceeding Series, 2016, pp. 81\u201387.","DOI":"10.1145\/2947626.2947639"},{"key":"7301_CR10","unstructured":"Ross, M., Hannes, T., and Jara, A., Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures, 2017. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot\/at_download\/fullReport. Accessed January 21, 2019."},{"key":"7301_CR11","unstructured":"Mussomeli, A., Doug, G., and Laaper, S., The Rise of the Digital Supply Network, Deloitte Univ. Press, 2016, vol. 1."},{"key":"7301_CR12","doi-asserted-by":"crossref","unstructured":"Lin, S., Crawford, M., and Mellor, S., The Industrial Internet of Things Volume G1: Reference Architecture, 2017. https:\/\/www.iiconsortium.org\/IIC_PUB_G1_V1.80_2017-01-31.pdf. Accessed February 19, 2019.","DOI":"10.1093\/eurheartj\/sux040"},{"key":"7301_CR13","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075.","journal-title":"Autom. Control Comput. Sci."},{"key":"7301_CR14","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1134\/S0040601516130073","volume":"63","author":"Y.S. Vasiliev","year":"2016","unstructured":"Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948\u2013956.","journal-title":"Therm. Eng."},{"key":"7301_CR15","doi-asserted-by":"crossref","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security: International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS-2010), 2010, pp. 337\u2013344.","DOI":"10.1007\/978-3-642-14706-7_27"},{"key":"7301_CR16","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, no. 1. https:\/\/doi.org\/10.1088\/1757-899X\/497\/1\/012006","DOI":"10.1088\/1757-899X\/497\/1\/012006"},{"key":"7301_CR17","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.3103\/S0146411618080333","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Digital Manufacturing Security Indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150\u20131159. https:\/\/doi.org\/10.3103\/S0146411618080333","journal-title":"Autom. Control Comput. Sci."},{"key":"7301_CR18","first-page":"60","volume":"2603","author":"E. Pavlenko","year":"2019","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60\u201364.","journal-title":"CEUR Workshop Proc."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080106.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080106","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080106.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:20Z","timestamp":1773612380000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7301"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080106","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"6 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}