{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:28Z","timestamp":1773655528470,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s014641162008026x","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"822-828","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET"],"prefix":"10.3103","volume":"54","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]},{"given":"M. D.","family":"Stepanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7298_CR1","doi-asserted-by":"crossref","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Sochi, 2019, pp. 1\u20133.","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"7298_CR2","doi-asserted-by":"publisher","first-page":"899","DOI":"10.3103\/S0146411617080119","volume":"51","author":"M.O. Kalinin","year":"2017","unstructured":"Kalinin, M.O. and Minin, A.A., Security evaluation of a wireless ad-hoc network with dynamic topology, Autom.\u00a0Control Comput. Sci., 2017, vol. 51, no. 8, pp. 899\u2013901.","journal-title":"Autom.\u00a0Control Comput. Sci."},{"key":"7298_CR3","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, ACM International Conference Proceeding Series, 2018. https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7298_CR4","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73\u201379. https:\/\/doi.org\/10.1145\/3136825.3136890","DOI":"10.1145\/3136825.3136890"},{"key":"7298_CR5","unstructured":"Leonov, A.V. and Chaplyshkin, V.A., FANETs, Omsk. Nauchn. Vestn., 2015, no. 3, pp. 297\u2013301."},{"key":"7298_CR6","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/S0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR7","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3103\/S0146411618080254","volume":"52","author":"Yu.S. Vasilev","year":"2018","unstructured":"Vasilev, Yu.S., Zegzhda, D.P., and Poltavtseva, M.A., Problems of security in digital production and its resistance to cyber threats, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1090\u20131100.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR8","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/S0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0977\u2013983.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR9","doi-asserted-by":"publisher","unstructured":"Busygin, A., Konoplev, A., Kalinin, M., and Zegzhda, D., Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services, ACM International Conference Proceeding Series, 2018. https:\/\/doi.org\/10.1145\/3264437.3264463","DOI":"10.1145\/3264437.3264463"},{"key":"7298_CR10","unstructured":"Leonov, A.V. and Litvinov, G.A., Application of the algorithm of the bee colony BeeAdHoc for routing in FANET, Vestn. Sib. Gos. Univ. Telekommun. Inf., 2018, no. 1, pp. 85\u201395."},{"key":"7298_CR11","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR12","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, ACM International Conference Proceeding Series, 2019. https:\/\/doi.org\/10.1145\/3357613.3357623","DOI":"10.1145\/3357613.3357623"},{"key":"7298_CR13","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/S0146411618080199","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR14","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, 2018. https:\/\/doi.org\/10.1109\/RUSAUTOCON.2018.8501783","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"7298_CR15","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/S0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Y., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR16","unstructured":"Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies 2010, EISWT 2010, 2010, pp. 104\u2013110."},{"key":"7298_CR17","unstructured":"Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies 2010, EISWT 2010, 2010, pp. 104\u2013110."},{"key":"7298_CR18","first-page":"34","volume":"2603","author":"D. Lavrova","year":"2019","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., 2019, vol. 2603, pp. 34\u201339.","journal-title":"CEUR Workshop Proc."},{"key":"7298_CR19","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/S0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0977\u2013983.","journal-title":"Autom. Control Comput. Sci."},{"key":"7298_CR20","first-page":"795","volume":"2018","author":"V. Krundyshev","year":"2018","unstructured":"Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, 2018 IEEE Industrial Cyber-Physical Systems, \n               ICPS 2018, 2018, pp. 795\u2013800.","journal-title":"ICPS"},{"key":"7298_CR21","unstructured":"Khodashinskii, I.A., Gorbunov, I.V., and Dudin, P.A., Ant and bee colony algorithms for training fuzzy systems, Dokl. Tomsk. Gos. Univ. Sist. Upr. Radioelektron., 2009, no. 2, pp. 157\u2013161."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162008026X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162008026X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162008026X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:30Z","timestamp":1773612150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162008026X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7298"],"URL":"https:\/\/doi.org\/10.3103\/s014641162008026x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"5 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}