{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:55Z","timestamp":1773615595160,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080137","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"978-983","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Localization of the Root Cause of the Anomaly"],"prefix":"10.3103","volume":"55","author":[{"given":"A. A.","family":"Grusho","sequence":"first","affiliation":[]},{"given":"N. A.","family":"Grusho","sequence":"additional","affiliation":[]},{"given":"M. I.","family":"Zabezhailo","sequence":"additional","affiliation":[]},{"given":"E. E.","family":"Timonina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7425_CR1","series-title":"Adaptive anomaly detection and root cause analysis by fusing semantics and machine learning","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98192-5_46","volume-title":"The Semantic Web: ESWC 2018 Satellite Events","author":"B. Steenwinckel","year":"2018","unstructured":"Steenwinckel, B., Adaptive anomaly detection and root cause analysis by fusing semantics and machine learning,  The Semantic Web: ESWC 2018 Satellite Events, Gangemi, A., Gentile, A.L., Nuzzolese, A.G., Rudolph, S., Maleshkova, M., Paulheim, H., Pan, J.Z., and Alam, M., Eds., Lecture Notes in Computer Science, vol. 11155, Cham: Springer, 2018, pp.\u00a0272\u2013282. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-98192-5_46"},{"key":"7425_CR2","series-title":"The bans in finite probability spaces and the problem of small samples","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36614-8_44","volume-title":"Distributed Computer and Communication Networks. DCCN 2019","author":"A. Grusho","year":"2019","unstructured":"Grusho, A., Grusho, N., and Timonina, E., The bans in finite probability spaces and the problem of small samples,  Distributed Computer and Communication Networks. DCCN 2019, Vishnevskiy, V., Samouylov, K., and Kozyrev, D., Eds., Lecture Notes in Computer Science, vol. 11965, Cham: Springer, 2019, pp. 578\u2013590. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-36614-8_44"},{"key":"7425_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.14357\/19922264190413","volume":"13","author":"A.A. Grusho","year":"2019","unstructured":"Grusho, A.A., Zabezhailo, M.I., Grusho, N.A., and Timonina, E.E., Concepts forming on the basis of small samples, Inf. Ee Primen., 2019, vol. 13, no. 4, pp. 81\u201384. \u00a0https:\/\/doi.org\/10.14357\/19922264190413","journal-title":"Inf. Ee Primen."},{"key":"7425_CR4","doi-asserted-by":"publisher","unstructured":"Grusho, A., Grusho, N., and Timonina, E., Method of several information spaces for identification of anomalies, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 515\u2013520. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-32258-8_60","DOI":"10.1007\/978-3-030-32258-8_60"},{"key":"7425_CR5","series-title":"Bioinspired intrusion detection in ITC infrastructures","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64430-7_2","volume-title":"Technological Transformation: A New Role for Human, Machines and Management. TT 2020","author":"S. Lim","year":"2021","unstructured":"Lim, S., Kalinin, M., and Zegzhda, P., Bioinspired intrusion detection in ITC infrastructures, in Technological Transformation: A New Role for Human, Machines and Management. TT 2020, Schaumburg, H., Korablev, V., and Ungvari, L., Eds., Cham: Springer, 2021, pp. 10\u201322. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-64430-7_2"},{"key":"7425_CR6","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 818\u2013823. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390812","DOI":"10.1109\/ICPHYS.2018.8390812"},{"key":"7425_CR7","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, Proc. 9th Int. Conf. on Security of Information and Networks, Newark, N.J., 2016, New York: Association for Computing Machinery, 2016, pp. 81\u201387. \u00a0https:\/\/doi.org\/10.1145\/2947626.2947639","DOI":"10.1145\/2947626.2947639"},{"key":"7425_CR8","series-title":"A survey of automated root cause analysis of software vulnerability","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93554-6_74","volume-title":"Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2018","author":"J.S. Jurn","year":"2019","unstructured":"Jurn, J.S., Kim, T., and Kim, H., A survey of automated root cause analysis of software vulnerability,  Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2018, Barolli, L., Xhafa, F., Javaid, N., and Enokido, T., Eds., Cham: Springer, 2019, pp. 756\u2013761. https:\/\/doi.org\/10.1007\/978-3-319-93554-6_74"},{"key":"7425_CR9","doi-asserted-by":"publisher","first-page":"110432","DOI":"10.1016\/j.jss.2019.110432","volume":"159","author":"A. Brandon","year":"2020","unstructured":"Brandon, A., Sol\u00e9, M., Hu\u00e9lamo, A., Solans, D., P\u00e9rez, M.S., and Munt\u00e9s-Mulero, V., Graph-based root cause analysis for service-oriented and microservice architectures, J. Syst. Software, 2020, vol. 159, p. 110432.\u00a0https:\/\/doi.org\/10.1016\/j.jss.2019.110432","journal-title":"J. Syst. Software"},{"key":"7425_CR10","unstructured":"Nikolaeva, E.K., \u201cSem\u2019 instrumentov kachestva\u201d v yaponskoi ekonomike (Seven Quality Tools in Japan Economy), Moscow: Izd. Standartov, 1990."},{"key":"7425_CR11","doi-asserted-by":"publisher","DOI":"10.1201\/b10988","volume-title":"Root Cause Analysis: Improving Performance for Bottom-Line Results","author":"M.A. Latino","year":"2016","unstructured":"Latino, M.A., Latino, R.J., and Latino, K., Root Cause Analysis: Improving Performance for Bottom-Line Results, CRC Press, 2016, 4th ed."},{"key":"7425_CR12","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"M. Sutton","year":"2007","unstructured":"Sutton, M., Greene, A., and Amini, P., Fuzzing: Brute Force Vulnerability Discovery, Pearson Education, 2007."},{"key":"7425_CR13","doi-asserted-by":"publisher","first-page":"918","DOI":"10.3103\/S0146411618080278","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Poltavtseva, M.A., Pechenkin, A.I., Lavrova, D.S., and Zaitseva, E.A., A\u00a0use case analysis of heterogeneous semistructured objects in information security problems, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 918\u2013930. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080278","journal-title":"Autom. Control Comput. Sci."},{"key":"7425_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.14357\/19922264200401","volume":"14","author":"A.A. Grusho","year":"2020","unstructured":"Grusho, A.A., Zabezhailo, M.I., Smirnov, D.V., and Timonina, E.E., On probabilistic estimates of the validity of empirical conclusions, Inf. Ee Primen., 2020, vol. 14, no. 4, pp. 3\u20138. https:\/\/doi.org\/10.14357\/19922264200401","journal-title":"Inf. Ee Primen."},{"key":"7425_CR15","first-page":"196","volume":"22","author":"D. Zegzhda","year":"2019","unstructured":"Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlin. Phenom. Complex Syst. (Minsk, Belarus), 2019, vol. 22, no. 2, pp. 196\u2013204.","journal-title":"Nonlin. Phenom. Complex Syst. (Minsk, Belarus)"},{"key":"7425_CR16","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080369","journal-title":"Autom. Control Comput. Sci."},{"key":"7425_CR17","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Lavrova, D., and Khushkeev, A., Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series, IEEE Int. Conf. on Industrial Cyber Physical Systems (ICPS), Taipei, 2019, IEEE, 2019, pp.\u00a0780\u2013784.\u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2019.8780304","DOI":"10.1109\/ICPHYS.2019.8780304"},{"key":"7425_CR18","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., Moscow, 2019, Basarab,\u00a0M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 34\u201339."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080137.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080137","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080137.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:00Z","timestamp":1773612120000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7425"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080137","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"22 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}