{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:02:51Z","timestamp":1773655371072,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080083","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1061-1067","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using Security-through-Obscurity Principle in an Industrial Internet of Things"],"prefix":"10.3103","volume":"55","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7435_CR1","doi-asserted-by":"publisher","first-page":"2702","DOI":"10.1109\/COMST.2019.2910750","volume":"21","author":"N. Neshenko","year":"2019","unstructured":"Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., and Ghani, N., Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations, IEEE Commun. Surv. Tutorials, 2019, vol. 21, no. 3, pp. 2702\u20132733. \u00a0https:\/\/doi.org\/10.1109\/COMST.2019.2910750","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7435_CR2","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 60\u201364."},{"key":"7435_CR3","series-title":"Using graph theory for cloud system security modeling","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33704-8_26","volume-title":"Computer Network Security. MMM-ACNS 2012","author":"P.D. Zegzhda","year":"2012","unstructured":"Zegzhda, P.D., Zegzhda, D.P., and Nikolsky, A.V., Using graph theory for cloud system security modeling,  Computer Network Security. MMM-ACNS 2012, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 7531, Berlin: Springer, 2012, pp.\u00a0309\u2013318. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-33704-8_26"},{"key":"7435_CR4","doi-asserted-by":"publisher","unstructured":"Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 830\u2013834. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390814","DOI":"10.1109\/ICPHYS.2018.8390814"},{"key":"7435_CR5","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1134\/S1064230720020124","volume":"59","author":"D.P. Zegzhda","year":"2020","unstructured":"Zegzhda, D.P., Lavrova, D.S., and Pavlenko, E.Yu., Management of a dynamic infrastructure of complex systems under conditions of directed cyber attacks, J. Comput. Syst. Sci. Int., 2020, vol. 59, no. 3, pp. 358\u2013370. \u00a0https:\/\/doi.org\/10.1134\/S1064230720020124","journal-title":"J. Comput. Syst. Sci. Int."},{"key":"7435_CR6","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.3103\/S0146411619080212","volume":"53","author":"R.A. Ognev","year":"2019","unstructured":"Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no.\u00a08, pp. 1045\u20131055. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080212","journal-title":"Autom. Control Comput. Sci."},{"key":"7435_CR7","doi-asserted-by":"publisher","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Estimating the sustainability of cyber-physical systems based on spectral graph theory, IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019, IEEE, 2019, pp. 1\u20135. \u00a0https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812826","DOI":"10.1109\/BlackSeaCom.2019.8812826"},{"key":"7435_CR8","doi-asserted-by":"publisher","unstructured":"Zegzhda, D. and Stepanova, T., Achieving internet of things security via providing topological sustainability, Science and Information Conf. (SAI), London, 2015, IEEE, 2015, pp. 269\u2013276. \u00a0https:\/\/doi.org\/10.1109\/SAI.2015.7237154","DOI":"10.1109\/SAI.2015.7237154"},{"key":"7435_CR9","doi-asserted-by":"crossref","unstructured":"Lin, S., Crawford, M., and Mellor, S., The industrial Internet of Things, Volume G1: Reference Architecture, 2017. https:\/\/www.iiconsortium.org\/IIC_PUB_G1_V1.80_2017-01-31.pdf. Cited February 19, 2019.","DOI":"10.1093\/eurheartj\/sux040"},{"key":"7435_CR10","unstructured":"Ross, M., Hannes, T., and Jara, A., Baseline security recommendations for IoT in the context of critical information infrastructures, 2017. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot\/at_download\/fullReport. Cited January 21, 2019."},{"key":"7435_CR11","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-167812\/v1","volume-title":"A multi-layer industrial-IoT attack taxonomy: Layers, dimensions, techniques and application","author":"S.G. Abbas","year":"2021","unstructured":"Abbas, S.G., Hashmat, F., and Shah, G.A., A multi-layer industrial-IoT attack taxonomy: Layers, dimensions, techniques and application, Res. Square, 2021. https:\/\/doi.org\/10.21203\/rs.3.rs-167812\/v1"},{"key":"7435_CR12","unstructured":"Secrecy (obscurity) is a valid security layer, 2019. https:\/\/danielmiessler.com\/study\/security-by-obscurity\/. Cited February 5, 2021."},{"key":"7435_CR13","unstructured":"Garlic routing and \u201cgarlic\u201d terminology, 2014. https:\/\/geti2p.net\/en\/docs\/how\/garlic-routing. Cited December 20, 2021."},{"key":"7435_CR14","doi-asserted-by":"publisher","unstructured":"Hoang, N.P., Kintis, P., Antonakakis, M., and Polychronakis, M., An empirical study of the I2P anonymity network and its censorship resistance, in Proc. Internet Measurement Conf., Boston, \n               2018, New York: Association for Computing Machinery, 2018, pp. 379\u2013392. \u00a0https:\/\/doi.org\/10.1145\/3278532.3278565","DOI":"10.1145\/3278532.3278565"},{"key":"7435_CR15","series-title":"Towards measuring anonymity","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies. PET 2002","author":"C. Diaz","year":"2003","unstructured":"Diaz, C., Seys, S., Claessens, J., and Preneel, B., Towards measuring anonymity, in Privacy Enhancing Technologies. PET 2002, Dingledine, R. and Syverson, P., Eds., Lecture Notes in Computer Science, vol. 2482, Berlin: Springer, 2003, pp. 54\u201368. \u00a0https:\/\/doi.org\/10.1007\/3-540-36467-6_5"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080083.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080083","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080083.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:43Z","timestamp":1773612103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7435"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080083","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"19 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}