{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:00:13Z","timestamp":1773655213616,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080350","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"813-821","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem"],"prefix":"10.3103","volume":"54","author":[{"given":"E. A.","family":"Zaitseva","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7297_CR1","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931\u2013935.","journal-title":"Autom. Control Comput. Sci."},{"key":"7297_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390814","volume-title":"Sustainability of cyber-physical systems in the context of targeted destructive influences","author":"E. Pavlenko","year":"2018","unstructured":"Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830\u2013834."},{"key":"7297_CR3","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.3103\/S0146411618080333","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150\u20131159. https:\/\/doi.org\/10.3103\/S0146411618080333","journal-title":"Autom. Control Comput. Sci."},{"key":"7297_CR4","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812786","DOI":"10.1109\/BlackSeaCom.2019.8812786"},{"key":"7297_CR5","doi-asserted-by":"publisher","unstructured":"Kalinin, M.O., Permanent protection of information systems with method of automated security and integrity control, SIN'10: Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 118\u2013123. https:\/\/doi.org\/10.1145\/1854099.1854125","DOI":"10.1145\/1854099.1854125"},{"key":"7297_CR6","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-14706-7_27","volume":"6258","author":"D.P. Zegzhda","year":"2010","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337\u2013344.","journal-title":"Lect. Notes Comput. Sci."},{"key":"7297_CR7","doi-asserted-by":"crossref","unstructured":"Stepanova, T., Kalinin, M., Baranov, P., and Zegzhda, D., Homogeneity analysis of power consumption for information security purposes, Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 113\u2013117.","DOI":"10.1145\/1854099.1854124"},{"key":"7297_CR8","first-page":"60","volume":"2603","author":"E. Pavlenko","year":"2019","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60\u201364.","journal-title":"CEUR Workshop Proc."},{"key":"7297_CR9","unstructured":"Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196\u2013204."},{"key":"7297_CR10","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/ICPHYS.2018.8390812","volume":"2018","author":"D. Lavrova","year":"2018","unstructured":"Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, Proceedings of 2018 IEEE Industrial Cyber-Physical Systems, \n               ICPS \n               2018, 2018, pp. 818\u2013823. https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390812","journal-title":"ICPS"},{"key":"7297_CR11","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411617080144","volume":"51","author":"E.Yu. Pavlenko","year":"2017","unstructured":"Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829\u2013834.","journal-title":"Autom. Control Comput. Sci."},{"key":"7297_CR12","doi-asserted-by":"crossref","unstructured":"Lavrova, D.S., Zegzhda, D.P., and Zaitseva, E.A., Modeling of the network infrastructure of complex objects for solving the problem of countering cyber attacks, Vopr. Kiberbezop., 2019, no. 2, pp. 13\u201320.","DOI":"10.21681\/2311-3456-2019-2-13-20"},{"key":"7297_CR13","unstructured":"Kompo, F. and Pevzner, P., Genome Reconstruction: A Puzzle of a Billion Pieces. http:\/\/kvant.mccme.ru\/ pdf\/2014\/2014-03.pdf."},{"key":"7297_CR14","doi-asserted-by":"crossref","unstructured":"Sergushichev, A.A., et al., Combined application of de Bruyne graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat. Mekh. Inf., 2013, vol. 13, no. 2-2, pp. 51\u201357.","DOI":"10.18500\/1816-9791-2013-13-2-2-51-57"},{"key":"7297_CR15","unstructured":"Smart Grid Conceptual Model. http:\/\/www.science.smith.edu\/~jcardell\/Courses\/EGR325\/SmartGrid%20 Readings\/Smart%20Grid%20Interop%20Panel%202010%20Panel.pdf."},{"key":"7297_CR16","doi-asserted-by":"crossref","unstructured":"Hartmann, T., et al., Generating realistic smart grid communication topologies based on real-data, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, 2014, pp. 428\u2013433.","DOI":"10.1109\/SmartGridComm.2014.7007684"},{"key":"7297_CR17","doi-asserted-by":"crossref","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129\u2013135.","DOI":"10.1109\/WorldS4.2019.8904022"},{"key":"7297_CR18","unstructured":"Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies 2010, 2010, pp. 104\u2013110."},{"key":"7297_CR19","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-14706-7_17","volume":"6258","author":"Y.A. Markov","year":"2010","unstructured":"Markov, Y.A. and Kalinin, M.O., Intellectual intrusion detection with sequences alignment methods, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 217\u2013228.","journal-title":"Lect. Notes Comput. Sci."},{"key":"7297_CR20","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V. Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73\u201379. https:\/\/doi.org\/10.1145\/3136825.3136890","DOI":"10.1145\/3136825.3136890"},{"key":"7297_CR21","doi-asserted-by":"publisher","unstructured":"Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, ACM International Conference Proceeding Series, 2015. https:\/\/doi.org\/10.1145\/2799979.2800023","DOI":"10.1145\/2799979.2800023"},{"key":"7297_CR22","doi-asserted-by":"crossref","unstructured":"Konoplev, A.S. and Kalinin, M.O., Security policy verification in grid systems, Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 356\u2013358.","DOI":"10.1145\/2523514.2523559"},{"key":"7297_CR23","unstructured":"Kalinin, M.O. and Konoplev, A.S., Formalization of objectives of grid systems resources protection against unauthorized access, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 272\u2013277."},{"key":"7297_CR24","unstructured":"Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277\u2013284."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080350.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080350","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080350.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:46Z","timestamp":1773612106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080350"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7297"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080350","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"10 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}