{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:25Z","timestamp":1773655645320,"version":"3.50.1"},"reference-count":39,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080349","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"915-921","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Safety Methods for a New Generation of Automobiles"],"prefix":"10.3103","volume":"54","author":[{"given":"K. V.","family":"Vasil\u2019eva","sequence":"first","affiliation":[]},{"given":"E. Yu.","family":"Pavlenko","sequence":"additional","affiliation":[]},{"given":"P. V.","family":"Sem\u2019yanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7312_CR1","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Krundyshev, V., Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73\u201379.","DOI":"10.1145\/3136825.3136890"},{"key":"7312_CR2","doi-asserted-by":"crossref","unstructured":"Kalinin, M., Zegzhda, P., Zegzhda, D., Vasiliev, Y., and Belenko, V., Software defined security for vehicular ad hoc networks, 2016 International Conference on Information and Communication Technology Convergence, 2016, pp. 533\u2013537.","DOI":"10.1109\/ICTC.2016.7763528"},{"key":"7312_CR3","doi-asserted-by":"publisher","first-page":"906","DOI":"10.3103\/S014641161808014X","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906\u2013911.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR4","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V. Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https:\/\/doi.org\/10.1109\/BlackSeaCom.2018.8433628","DOI":"10.1109\/BlackSeaCom.2018.8433628"},{"key":"7312_CR5","doi-asserted-by":"publisher","first-page":"907","DOI":"10.3103\/S0146411617080120","volume":"51","author":"M.O. Kalinin","year":"2017","unstructured":"Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907\u2013914.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR6","doi-asserted-by":"publisher","first-page":"993","DOI":"10.3103\/S0146411618080308","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993\u2013999.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR7","unstructured":"Scalas, M. and Giacinto, G., Automotive Cybersecurity: Foundations for Next-Generation Vehicles, 2019. https:\/\/arxiv.org\/pdf\/1910.01037.pdf."},{"key":"7312_CR8","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3103\/S0146411618080035","volume":"52","author":"V.G. Anisimov","year":"2018","unstructured":"Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105\u20131110.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR9","unstructured":"Upstream Security. Global Automotive Cybersecurity Report, 2019. https:\/\/industrytoday.com\/wp-content\/uploads\/2018\/12\/Upstream-Security-Global-Automotive-Cybersecurity-Report-2019.pdf."},{"key":"7312_CR10","unstructured":"Mazloom, S. and Mason, G., A Security Analysis of an In Vehicle Infotainment and App Platform, 2016. http:\/\/damonmccoy.com\/papers\/ivi-woot.pdf."},{"key":"7312_CR11","unstructured":"Hickman, J., Ridin\u2019 With Apple CarPlay, 2019. https:\/\/thebinaryhick.blog\/2019\/05\/08\/ridin-with-apple-carplay\/."},{"key":"7312_CR12","doi-asserted-by":"crossref","unstructured":"Hickman, J., Driving Android Auto, 2019. https:\/\/dfir.pubpub.org\/pub\/716tlra7.","DOI":"10.21428\/482a8d7a"},{"key":"7312_CR13","doi-asserted-by":"publisher","first-page":"947","DOI":"10.3103\/S014641161708003X","volume":"51","author":"E.B. Aleksandrova","year":"2017","unstructured":"Aleksandrova, E.B., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR14","doi-asserted-by":"publisher","first-page":"969","DOI":"10.3103\/S0146411619080042","volume":"53","author":"E.B. Aleksandrova","year":"2019","unstructured":"Aleksandrova, E.B., Shkorkina, E.N., and Kalinin, M.O., Organization of the quantum cryptographic keys distribution system for transportation infrastructure users, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp.\u00a0969\u2013971.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR15","doi-asserted-by":"publisher","first-page":"879","DOI":"10.3103\/S0146411619080029","volume":"53","author":"E.B. Aleksandrova","year":"2019","unstructured":"Aleksandrova, E.B., Yarmak, A.V., and Kalinin, M.O., Analysis of approaches to group authentication in large-scale industrial systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 879\u2013882.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR16","doi-asserted-by":"publisher","first-page":"739","DOI":"10.3103\/S0146411616080265","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739\u2013742.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR17","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S0146411617080193","volume":"51","author":"N.N. Shenets","year":"2017","unstructured":"Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936\u2013946.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR18","doi-asserted-by":"publisher","first-page":"857","DOI":"10.3103\/S0146411619080297","volume":"53","author":"N.N. Shenets","year":"2019","unstructured":"Shenets, N.N., Security infrastructure of FANET based on secret sharing and authenticated encryption, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 857\u2013864.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR19","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, ACM International Conference Proceeding Series, 2018. https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7312_CR20","doi-asserted-by":"publisher","unstructured":"Krundyshev, V., Kalinin, M., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, IEEE Industrial Cyber-Physical Systems, ICPS \n               2018, 2018, pp. 795\u2013800. https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390808","DOI":"10.1109\/ICPHYS.2018.8390808"},{"key":"7312_CR21","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/S0146411618080199","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in VANETs, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR22","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https:\/\/doi.org\/10.1109\/RUSAUTOCON.2018.8501783","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"7312_CR23","first-page":"129","volume":"S4","author":"V. Belenko","year":"2019","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, \n               WorldS4, 2019, pp. 129\u2013135.","journal-title":"World"},{"key":"7312_CR24","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR25","doi-asserted-by":"crossref","unstructured":"Belenko, V., Chernenko, V., Krundyshev, V., and Kalinin, M., Data-driven failure analysis for the cyber physical infrastructures, 2019 IEEE International Conference on Industrial Cyber Physical Systems, ICPS 2019, 2019, pp.\u00a0775\u2013779.","DOI":"10.1109\/ICPHYS.2019.8854888"},{"key":"7312_CR26","doi-asserted-by":"publisher","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Estimating the sustainability of cyber-physical systems based on spectral graph theory, IEEE International Black Sea Conference on Communications and Networking, 2019. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812826","DOI":"10.1109\/BlackSeaCom.2019.8812826"},{"key":"7312_CR27","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.3103\/S0146411618080059","volume":"52","author":"A.G. Busygin","year":"2018","unstructured":"Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1080\u20131083.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR28","first-page":"60","volume":"2603","author":"E. Pavlenko","year":"2019","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60\u201364.","journal-title":"CEUR Workshop Proc."},{"key":"7312_CR29","doi-asserted-by":"crossref","unstructured":"Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 4, pp. 336\u2013341.","DOI":"10.33581\/1561-4085-2019-22-4-336-341"},{"key":"7312_CR30","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.3103\/S0146411618080205","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D. and Ivanov, D.V., Security provision in wireless sensor networks on the basis of the trust model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1042\u20131048.","journal-title":"Autom. Control Comput. Sci."},{"key":"7312_CR31","unstructured":"Nilsson, D., Larson, U., and Jonsson, E., Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes, 2018. https:\/\/IEEExplore.IEEE.org\/document\/4657091."},{"key":"7312_CR32","unstructured":"Hartwiche, F., Can with Flexible Data-Rate, 2012. https:\/\/www.can-cia.org\/fileadmin\/resources\/documents\/proceedings\/2012_hartwich.pdf."},{"key":"7312_CR33","unstructured":"Levi, M., Allouche, Y., and Kontorovich, A., Advanced Analytics for Connected Cars Cyber Security, 2017. https:\/\/arxiv.org\/pdf\/1711.01939."},{"key":"7312_CR34","unstructured":"Cho, K. and Shin, K., Fingerprinting Electronic Control Units for Vehicle Intrusion Detection, 2016. https:\/\/www.usenix.org\/system\/files\/conference\/usenixs\u042d\u0411Yrity16\/sec16_paper_cho.pdf."},{"key":"7312_CR35","unstructured":"Kneiband, M. and Huth, C., On the Fingerprinting of Electronic Control Units Using Physical Characteristics in Controller Area Networks, 2017. https:\/\/pdfs.semanticscholar.org\/3c6a\/1315926ec021583fc507a8cfbf649c4ea068.pdf."},{"key":"7312_CR36","unstructured":"Choi, W., Jo, H., Woo, S., and Chun, J., Identifying ECUs Using Inimitable Characteristics of Signals in Controller Area Networks, 2016. https:\/\/arxiv.org\/pdf\/1607.00497.pdf."},{"key":"7312_CR37","unstructured":"Song, H., Kim, H.R., and Kim, H.K., Intrusion Detection System Based on the Analysis of Time Intervals of CAN messages for In-Vehicle Network, 2016. https:\/\/awesong-kor.github.io\/files\/Intrusion%20Detection%20 System%20Based%20on%20the%20Analysis%20of%20Time%20Intervals%20of%20CAN%20Messages%20 for%20In-Vehicle%20Network.pdf."},{"key":"7312_CR38","unstructured":"Beltrame, G., et al., xLuna: A Real-Time, Dependable Kernel for Embedded Systems, 2010. https:\/\/amstel.estec. esa.int\/tecedm\/website\/biblio\/FossatiIPSOC2010_2.pdf."},{"key":"7312_CR39","unstructured":"Serra, J., Rodrigues, J., Almeid, T., and Andmendes, A., Multi-Criticality Hypervisor for Automotive Domain, 2014. https:\/\/st3.ning.com\/topology\/rest\/1.0\/file\/get\/1007753?profile=original."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080349.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080349","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080349.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:01Z","timestamp":1773612421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7312"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080349","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"6 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}