{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:19Z","timestamp":1773655879902,"version":"3.50.1"},"reference-count":12,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080174","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1080-1086","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier"],"prefix":"10.3103","volume":"55","author":[{"given":"D. A.","family":"Kulikov","sequence":"first","affiliation":[]},{"given":"V. V.","family":"Platonov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7437_CR1","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D. and Yarmak, A., Predicting cyber attacks on industrial systems using the Kalman filter, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 317\u2013321. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904038","DOI":"10.1109\/WorldS4.2019.8904038"},{"key":"7437_CR2","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019, IEEE, 2019, pp. 1\u20133. \u00a0https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812818","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"7437_CR3","unstructured":"Szededy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus,\u00a0R., Intriguing properties of neural networks, 2013. arXiv:1312.6199 [cs.CV]"},{"key":"7437_CR4","doi-asserted-by":"publisher","unstructured":"Tabassi, E., Burns, K., Hadjimichael, M., Molina-Markham, A., and Sexton, J., NISTIR 8269: A taxonomy and terminology of adversarial machine learning, 2019.https:\/\/doi.org\/10.6028\/NIST.IR.8269-draft","DOI":"10.6028\/NIST.IR.8269-draft"},{"key":"7437_CR5","unstructured":"Moustafa, N., The UNSW-NB15 dataset. www.unsw.adfa.edu.au\/unsw-canberra-cyber\/cybersecurity\/ADFA-NB15-Datasets\/. Cited January 9, 2021."},{"key":"7437_CR6","doi-asserted-by":"publisher","unstructured":"Moustafa, N. and Slay, J., UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), Military Communications and Information Systems Conf. (MilCIS), Canberra, 2015, IEEE, 2015, pp. 1\u20136. \u00a0https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"7437_CR7","unstructured":"Nikolenko, S., Kadurin, A.A., and Arkhangel\u2019skaya, E.O., Glubokoe obuchenie. Pogruzhenie v mir neironnykh setei (Deep Learning: Dive into the World of Neural Networks), St. Petersburg: Piter, 2018."},{"key":"7437_CR8","doi-asserted-by":"publisher","unstructured":"Elsayed, N., Maida, A. S., and Bayoumi, M. Deep gated recurrent and convolutional network hybrid model for univariate time series classification, Int. J. Adv. Comput. Sci. Appl., 2019, vol. 10, no. 5. https:\/\/doi.org\/10.14569\/IJACSA.2019.0100582","DOI":"10.14569\/IJACSA.2019.0100582"},{"key":"7437_CR9","unstructured":"Goodfellow I.J., Shlens, J., and Szegedy, C., Explaining and harnessing adversarial examples, 2014. arXiv:1412.6572 [stat.ML]"},{"key":"7437_CR10","unstructured":"Wiyanto, R. and Xu, A., Maximal Jacobian-based saliency map attack, 2018. arXiv:1808.07945 [cs.LG]"},{"key":"7437_CR11","unstructured":"Keras. https:\/\/keras.io\/about\/. Cited January 9, 2021."},{"key":"7437_CR12","unstructured":"TensorFlow. https:\/\/www.tensorflow.org\/. Cited January 9, 2021."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080174.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080174","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080174.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:51Z","timestamp":1773612231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7437"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080174","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"3 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}