{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:31Z","timestamp":1773615631134,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080118","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"854-859","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice"],"prefix":"10.3103","volume":"54","author":[{"given":"M. A.","family":"Eremeev","sequence":"first","affiliation":[]},{"given":"I. I.","family":"Zakharchuk","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7303_CR1","doi-asserted-by":"crossref","unstructured":"Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, no. 1.","DOI":"10.1088\/1757-899X\/497\/1\/012006"},{"key":"7303_CR2","doi-asserted-by":"publisher","first-page":"948","DOI":"10.3103\/S0146411619080078","volume":"53","author":"A.D. Dakhnovich","year":"2019","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., An approach to building cyber-resistant interactions in the industrial Internet of Things, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 948\u2013953.","journal-title":"Autom. Control Comput. Sci."},{"key":"7303_CR3","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.3103\/S0146411618080333","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Y., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150\u20131159.","journal-title":"Autom. Control Comput. Sci."},{"key":"7303_CR4","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075.","journal-title":"Autom. Control Comput. Sci."},{"key":"7303_CR5","unstructured":"Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196\u2013204."},{"key":"7303_CR6","doi-asserted-by":"crossref","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019, 2019, pp. 317\u2013321.","DOI":"10.1109\/WorldS4.2019.8904038"},{"key":"7303_CR7","first-page":"34","volume":"2603","author":"D. Lavrova","year":"2019","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34\u201339.","journal-title":"CEUR Workshop Proc."},{"key":"7303_CR8","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-14706-7_27","volume":"6258","author":"D.P. Zegzhda","year":"2010","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337\u2013344.","journal-title":"Lect. Notes Comput. Sci."},{"key":"7303_CR9","doi-asserted-by":"publisher","first-page":"972","DOI":"10.3103\/S0146411619080339","volume":"53","author":"D.P. Zegzhda","year":"2019","unstructured":"Zegzhda, D.P., Kalinin, M.O., and Levykin, M.V., Actual vulnerabilities of industrial automation protocols of an open platform communications series, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 972\u2013979.","journal-title":"Autom. Control Comput. Sci."},{"key":"7303_CR10","doi-asserted-by":"publisher","unstructured":"Stepanova, T., Pechenkin, A., and Lavrova, D., Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems, ACM International Conference Proceeding Series, 2015. https:\/\/doi.org\/10.1145\/2799979.2799995","DOI":"10.1145\/2799979.2799995"},{"key":"7303_CR11","doi-asserted-by":"publisher","first-page":"985","DOI":"10.3103\/S014641161708017X","volume":"51","author":"M.A. Poltavtseva","year":"2017","unstructured":"Poltavtseva, M.A. and Pechenkin, A.I., Intelligent data analysis in decision support systems for penetration tests, Autom. Control Comput. Sci., 2017, vol. 51, pp. 985\u2013991. https:\/\/doi.org\/10.3103\/S014641161708017X","journal-title":"Autom. Control Comput. Sci."},{"key":"7303_CR12","unstructured":"The Penetration Testing Execution Standard Documentation, Release 1.1. http:\/\/www.pentest-standard.org\/ index.php\/Post_Exploitation#Purpose. Accessed October 20, 2019."},{"key":"7303_CR13","unstructured":"Egressing Bluecoat with CobaltStike & Let\u2019s Encrypt. https:\/\/cybersyndicates.com\/2016\/12\/egressing-bluecoat-with-cobaltstike-letsencrypt\/. Accessed October 20, 2019."},{"key":"7303_CR14","unstructured":"Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike. https:\/\/www.cyberark.com\/threat-research-blog\/red-team-insights-https-domain-fronting-google-hosts-using-cobalt-strike\/. Accessed October 20, 2019."},{"key":"7303_CR15","unstructured":"https:\/\/github.com\/bluscreenofjeff\/bluscreenofjeff.github.io\/blob\/master\/_posts\/2017-03-01-how-to-make-communication-profiles-for-empire.md. Accessed October 20, 2019."},{"key":"7303_CR16","unstructured":"Empire \u2013 Modifying Server C2 Indicators. http:\/\/threatexpress.com\/2017\/05\/empire-modifying-server-c2-indicators\/. Accessed October 20, 2019."},{"key":"7303_CR17","unstructured":"Kosenko, M.Yu., A multi-agent system for detecting and blocking botnets by detecting control traffic based on data mining, Cand. Sci. (Eng.) Dissertation, Chelyabinsk, 2017."},{"key":"7303_CR18","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S014641161808028X","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Lavrova, D.S., and Shtyrkina, A.A., Multifractal analysis of internet backbone traffic for detecting denial of service attacks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 936\u2013944.","journal-title":"Autom. Control Comput. Sci."},{"key":"7303_CR19","doi-asserted-by":"publisher","unstructured":"Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, ACM International Conference Proceeding Series, 2015. https:\/\/doi.org\/10.1145\/2799979.2800023","DOI":"10.1145\/2799979.2800023"},{"key":"7303_CR20","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931\u2013935.","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080118.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080118","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080118.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:32Z","timestamp":1773612152000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7303"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080118","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"31 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}