{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:23Z","timestamp":1773615563842,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080149","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1115-1120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Use of Contradictions in Data for Finding Implicit Failures in Computer Systems"],"prefix":"10.3103","volume":"55","author":[{"given":"A. A.","family":"Grusho","sequence":"first","affiliation":[]},{"given":"N. A.","family":"Grusho","sequence":"additional","affiliation":[]},{"given":"M. I.","family":"Zabezhailo","sequence":"additional","affiliation":[]},{"given":"E. E.","family":"Timonina","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7443_CR1","unstructured":"Lavrova, D., Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., Moscow, 2019, Basarab,\u00a0M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 34\u201339."},{"key":"7443_CR2","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 317\u2013321. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904038","DOI":"10.1109\/WorldS4.2019.8904038"},{"key":"7443_CR3","doi-asserted-by":"publisher","first-page":"931","DOI":"10.3103\/S0146411618080187","volume":"52","author":"D.S. Lavrova","year":"2018","unstructured":"Lavrova, D.S., Alekseev, I.V., Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931\u2013935. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080187","journal-title":"Autom. Control Comput. Sci."},{"key":"7443_CR4","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 60\u201364."},{"key":"7443_CR5","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.3390\/sym12111931","volume":"12","author":"D. Zegzhda","year":"2020","unstructured":"Zegzhda, D., Lavrova, D., Pavlenko, E., and Shtyrkina, A. Cyber attack prevention based on evolutionary cybernetics approach, Symmetry, 2020, vol. 12, no. 11, p. 1931. \u00a0https:\/\/doi.org\/10.3390\/sym12111931","journal-title":"Symmetry"},{"key":"7443_CR6","series-title":"Adaptive anomaly detection and root cause analysis by fusing semantics and machine learning","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98192-5_46","volume-title":"The Semantic Web: ESWC 2018 Satellite Events","author":"B. Steenwinckel","year":"2018","unstructured":"Steenwinckel, B., Adaptive anomaly detection and root cause analysis by fusing semantics and machine learning,   The Semantic Web: ESWC 2018 Satellite Events, Gangemi, A., Gentile, A.L., Nuzzolese, A.G., Rudolph, S., Maleshkova, M., Paulheim, H., Pan, J.Z., and Alam, M., Eds., Lecture Notes in Computer Science, vol. 11155, Cham: Springer, 2018, pp. 272\u2013282. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-98192-5_46"},{"key":"7443_CR7","series-title":"A survey of automated root cause analysis of software vulnerability","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93554-6_74","volume-title":"Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2018","author":"J.S. Jurn","year":"2019","unstructured":"Jurn, J.S., Kim, T., and Kim, H., A survey of automated root cause analysis of software vulnerability,  Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2018, Barolli, L., Xhafa, F., Javaid, N., and Enokido, T., Eds., Cham: Springer, 2019, pp. 756\u2013761. https:\/\/doi.org\/10.1007\/978-3-319-93554-6_74"},{"key":"7443_CR8","doi-asserted-by":"publisher","unstructured":"Grusho, A., Grusho, N., and Timonina, E., Method of several information spaces for identification of anomalies, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 515\u2013520. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-32258-8_60","DOI":"10.1007\/978-3-030-32258-8_60"},{"key":"7443_CR9","unstructured":"Samuilov, K.E., Chukarin, A.V., and Yarkina, N.V., Biznes-protsessy i informatsionnye tekhnologii v upravlenii telekommunikatsionnymi kompaniyami (Business Processes and Information Technologies in Management of Telecommunication Enterprises), Moscow: Al\u2019pina Pablishers, 2009."},{"key":"7443_CR10","doi-asserted-by":"publisher","first-page":"110432","DOI":"10.1016\/j.jss.2019.110432","volume":"159","author":"A. Brandon","year":"2020","unstructured":"Brandon, A., Sol\u00e9, M., Hu\u00e9lamo, A., Solans, D., P\u00e9rez, M.S., and Munt\u00e9s-Mulero, V., Graph-based root cause analysis for service-oriented and microservice architectures, J. Syst. Software, 2020, vol. 159, p. 110432.\u00a0https:\/\/doi.org\/10.1016\/j.jss.2019.110432","journal-title":"J. Syst. Software"},{"key":"7443_CR11","doi-asserted-by":"publisher","unstructured":"Behravan, A., Obermaisser, R., Basavegowda, D.H., and Meckel, S., Automatic model-based fault detection and diagnosis using diagnostic directed acyclic graph for a demand-controlled ventilation and heating system in Simulink, Ann. IEEE Int. Systems Conf. (SysCon), Vancouver, 2018, IEEE, 2018, pp. 1\u20137. \u00a0https:\/\/doi.org\/10.1109\/SYSCON.2018.8369614","DOI":"10.1109\/SYSCON.2018.8369614"},{"key":"7443_CR12","series-title":"Generation of metadata for network control","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66471-8_55","volume-title":"Distributed Computer and Communication Networks. DCCN 2020","author":"A. Grusho","year":"2020","unstructured":"Grusho, A., Grusho, N., Zabezhailo, M., and Timonina, E., Generation of metadata for network control, Distributed Computer and Communication Networks. DCCN 2020, Vishnevskiy, V.M., Samouylov, K.E., and Kozyrev, D.V., Eds., Lecture Notes in Computer Science, vol. 12563, Cham: Springer, 2020, pp. 723\u2013735.\u00a0https:\/\/doi.org\/10.1007\/978-3-030-66471-8_55"},{"key":"7443_CR13","doi-asserted-by":"crossref","unstructured":"Grusho, A., Grusho, N., Zabezhailo, M., Timonina, E., and Senchilo, V., Metadata for root cause analysis, Commun. ECMS, 2021, vol. 35, no. 1 (in press).","DOI":"10.7148\/2021-0267"},{"key":"7443_CR14","unstructured":"Prokhorov, Yu.V. and Rozanov, Yu.A., Teoriya veroyatnostei (Probability Theory), Moscow: Nauka, 1993."},{"key":"7443_CR15","first-page":"43","volume":"3","author":"A.A. Grusho","year":"1996","unstructured":"Grusho, A.A., Consistent significance criteria for cluster structures based on pairwise proximity measures, Obozr. Prikl. Promysh. Mat., 1996, vol. 3, no. 1, pp. 43\u201346.","journal-title":"Obozr. Prikl. Promysh. Mat."},{"key":"7443_CR16","unstructured":"Shiryaev, A.N., Veroyatnost\u2019 (Probability), 2 vols., Moscow: MTsNMO, 2004, 3rd ed."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080149.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080149","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080149.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:36Z","timestamp":1773612096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7443"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080149","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"13 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}