{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:02:21Z","timestamp":1773655341348,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080101","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1111-1114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems"],"prefix":"10.3103","volume":"55","author":[{"given":"A. D.","family":"Fatin","sequence":"first","affiliation":[]},{"given":"E. Yu.","family":"Pavlenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7442_CR1","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1134\/S0040601516130073","volume":"63","author":"Yu.S. Vasiliev","year":"2016","unstructured":"Vasiliev, Yu.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp.\u00a0948\u2013956. \u00a0https:\/\/doi.org\/10.1134\/S0040601516130073","journal-title":"Therm. Eng."},{"key":"7442_CR2","doi-asserted-by":"publisher","first-page":"673","DOI":"10.3103\/S0146411616080125","volume":"50","author":"D.S. Lavrova","year":"2016","unstructured":"Lavrova, D.S., An approach to developing the SIEM system for the Internet of Things, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 673\u2013681. \u00a0https:\/\/doi.org\/10.3103\/S0146411616080125","journal-title":"Autom. Control Comput. Sci."},{"key":"7442_CR3","doi-asserted-by":"publisher","unstructured":"Stepanova, T. and Zegzhda, D., Applying large-scale adaptive graphs to modeling internet of things security, Proc. 7th Int. Conf. on Security of Information and Networks, Glasgow, 2014, New York: Association for Computing Machinery, 2014, pp. 479\u2013482. \u00a0https:\/\/doi.org\/10.1145\/2659651.2659696","DOI":"10.1145\/2659651.2659696"},{"key":"7442_CR4","series-title":"PAQ: Time series forecasting for approximate query answering in sensor networks","doi-asserted-by":"publisher","DOI":"10.1007\/11669463_5","volume-title":"Wireless Sensor Networks. EWSN 2006","author":"D. Tulone","year":"2006","unstructured":"Tulone, D. and Madden, S., PAQ: Time series forecasting for approximate query answering in sensor networks,  Wireless Sensor Networks. EWSN 2006, R\u00f6mer, K., Karl, H., and Mattern, F., Eds., Lecture Notes in Computer Science, vol. 3868, Berlin: Springer, 2006, pp. 21\u201337. \u00a0https:\/\/doi.org\/10.1007\/11669463_5"},{"key":"7442_CR5","unstructured":"Wei, L., Kumar, N., Lolla, V., Keogh, E.J., Lonardi, S., and Ratanamahatana, Ch., Assumption-free anomaly detection in time series, Proc. 17th Int. Conf. on Scientific and Statistical Database Management, Santa Barbara, Calif., 2005, Frew, J., Ed., Berkeley, Calif.: Lawrence Berkeley Laboratory, 2005, pp. 237\u2013240."},{"key":"7442_CR6","first-page":"2","volume":"24","author":"B. Pincombe","year":"2005","unstructured":"Pincombe, B., Anomaly detection in time series of graphs using ARMA processes, Asor Bull., 2005, vol, 24, no.\u00a04, pp. 2\u201310.","journal-title":"Asor Bull."},{"key":"7442_CR7","doi-asserted-by":"publisher","unstructured":"Hundman, K., Constantinou, V., Laporte, Ch., and Colwell, I., and Soderstrom, T., Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding, Proc. 24th ACM SIGKDD Int. Conf. on Knowledge Discovery & Data Mining, London, 2018, New York: Association for Computing Machinery, 2018, pp.\u00a0387\u2013395. https:\/\/doi.org\/10.1145\/3219819.3219845","DOI":"10.1145\/3219819.3219845"},{"key":"7442_CR8","unstructured":"Filonov, P., Lavrentyev, A., and Vorontsov, A., Multivariate industrial time series with cyber-attack simulation: Fault detection using an LSTM-based predictive data model, NIPS Time Series Workshop, Barcelona, 2016. arXiv:1612.06676 [cs.LG]"},{"key":"7442_CR9","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 317\u2013321. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904038","DOI":"10.1109\/WorldS4.2019.8904038"},{"key":"7442_CR10","doi-asserted-by":"publisher","DOI":"10.21227\/fesz-dm97","volume-title":"The ToN_IoT datasets","author":"N. Moustafa","year":"2019","unstructured":"Moustafa, N., The ToN_IoT datasets, IEEE DataPort, 2019. https:\/\/doi.org\/10.21227\/fesz-dm97"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080101.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080101","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080101.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:15Z","timestamp":1773612195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7442"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080101","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"3 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}