{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:14Z","timestamp":1773655874423,"version":"3.50.1"},"reference-count":25,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080241","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"991-998","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices"],"prefix":"10.3103","volume":"55","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"V. D.","family":"Danilov","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7427_CR1","unstructured":"Sokolov, M.N., Smolyaninova, K.A., and Yakusheva, N.A., Security problems Internet of Things: Survey, Vopr. Kiberbezop., 2015, no. 5, pp. 32\u201335."},{"key":"7427_CR2","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"A.A. Diro","year":"2018","unstructured":"Diro, A.A. and Chilamkurti, N., Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst., 2018, vol. 82, pp. 761\u2013768. \u00a0https:\/\/doi.org\/10.1016\/j.future.2017.08.043","journal-title":"Future Gener. Comput. Syst."},{"key":"7427_CR3","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 295\u2013298. \u00a0https:\/\/doi.org\/10.1145\/3136825.3136857","DOI":"10.1145\/3136825.3136857"},{"key":"7427_CR4","doi-asserted-by":"publisher","unstructured":"Kalinin, M. and Zegzhda, P., AI-based security for the smart networks, 13th Int. Conf. on Security of Information and Networks, Merkez, Turkey, 2020, New York: Association for Computing Machinery, 2020, pp. 1\u20134. \u00a0https:\/\/doi.org\/10.1145\/3433174.3433593","DOI":"10.1145\/3433174.3433593"},{"key":"7427_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.33581\/1561-4085-2020-23-4-397-404","volume":"23","author":"M. Kalinin","year":"2020","unstructured":"Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2020, vol. 23, no.\u00a04, pp. 397\u2013404. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-397-404","journal-title":"Nonlinear Phenom. Complex Syst. (Minsk, Belarus)"},{"key":"7427_CR6","doi-asserted-by":"publisher","unstructured":"Cho, H., Lim, S., Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Genetic sequence alignment computing for ensuring cyber security of the IoT systems, in Sustainable Intelligent Systems, Joshi, A., Nagar, A.K., Mar\u00edn-Ravent\u00f3s, G., Eds., Advances in Sustainability Science and Technology, Singapore: Springer, 2021, pp. 235\u2013252. \u00a0https:\/\/doi.org\/10.1007\/978-981-33-4901-8_14","DOI":"10.1007\/978-981-33-4901-8_14"},{"key":"7427_CR7","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zegzhda, P., Artificial swarm algorithm for VANET protection against routing attacks, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 795\u2013800. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390808","DOI":"10.1109\/ICPHYS.2018.8390808"},{"key":"7427_CR8","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Kalinin, M., Pechenkin, A., Minin, A., and Lavrova, D., Safe integration of SIEM systems with Internet of Things: Data aggregation, integrity control, and bioinspired safe routing, Proc. 9th Int. Conf. on Security of Information and Networks, Newark, N.J., 2016, New York: Association for Computing Machinery, 2016, pp. 81\u201387. \u00a0https:\/\/doi.org\/10.1145\/2947626.2947639","DOI":"10.1145\/2947626.2947639"},{"key":"7427_CR9","doi-asserted-by":"publisher","first-page":"766","DOI":"10.3103\/S0146411615080131","volume":"49","author":"V.V. Platonov","year":"2015","unstructured":"Platonov, V.V. and Semenov, P.O., Using data-mining methods to detect network attacks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 766\u2013769. \u00a0https:\/\/doi.org\/10.3103\/S0146411615080131","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR10","doi-asserted-by":"publisher","first-page":"889","DOI":"10.3103\/S0146411619080194","volume":"53","author":"E.V. Malyshev","year":"2019","unstructured":"Malyshev, E.V., Moskvin, D.A., and Zegzhda, D.P., Application of an artificial neural network for detection of attacks in VANETs, Autom. Control Comput. Sci., 2019, vol. 53, no.\u00a08, pp. 889\u2013894. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080194","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR11","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR12","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/S0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR13","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/S0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0977\u2013983. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080163","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR14","doi-asserted-by":"publisher","first-page":"912","DOI":"10.3103\/S0146411618080151","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Lavrova, D.S., and Yarmak, A.V., Detection of threats in cyberphysical systems based on deep learning methods using multidimensional time series, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 912\u2013917. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080151","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR15","unstructured":"Fimichev, N.N., The use of neural networks in intrusion detection, Sovr. Nauch. Issled. Innovatsii, 2015, no. 10, pp. 91\u201393."},{"key":"7427_CR16","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., and Zubkov, E., Estimation of applicability of modern neural network methods for preventing cyberthreats to self-organizing network infrastructures of digital economy platforms, SHS Web Conf., 2018, vol. 44, p. 00044. \u00a0https:\/\/doi.org\/10.1051\/shsconf\/20184400044","DOI":"10.1051\/shsconf\/20184400044"},{"key":"7427_CR17","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of cyber attacks in smart manufacturing applying modern neural network methods, IOP Conf. Ser.: Mater. Sci. Eng., 2020, vol. 940, p.\u00a0012011. \u00a0https:\/\/doi.org\/10.1088\/1757-899X\/940\/1\/012011","DOI":"10.1088\/1757-899X\/940\/1\/012011"},{"key":"7427_CR18","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, p. 9. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7427_CR19","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.3103\/S0146411618080369","volume":"52","author":"A.D. Dakhnovich","year":"2018","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Zegzhda, D.P., Analysis of the information security threats in the digital production networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1071\u20131075. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080369","journal-title":"Autom. Control Comput. Sci."},{"key":"7427_CR20","doi-asserted-by":"publisher","unstructured":"Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, IEEE Int. Conf. on Industrial Cyber Phys. Syst. (ICPS), Taipei, 2019, IEEE, 2019, pp.\u00a0785\u2013789. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2019.8780193","DOI":"10.1109\/ICPHYS.2019.8780193"},{"key":"7427_CR21","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of gan applicability for intrusion detection in self-organizing networks of cyber physical systems, Int. Russian Automation Conf. (RusAutoCon), Sochi,\u00a0Russia, 2018, IEEE, 2018, pp. 1\u20137. \u00a0https:\/\/doi.org\/10.1109\/RUSAUTOCON.2018.8501783","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"7427_CR22","doi-asserted-by":"publisher","first-page":"1967","DOI":"10.1109\/TNNLS.2018.2875194","volume":"30","author":"A. Creswell","year":"2019","unstructured":"Creswell, A. and Bharath, A.A., Inverting the generator of a generative adversarial network, IEEE Trans. Neural Networks Learn. Syst., 2019, vol. 30, no. 7, pp. 1967\u20131974. \u00a0https:\/\/doi.org\/10.1109\/TNNLS.2018.2875194","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"7427_CR23","doi-asserted-by":"publisher","DOI":"10.21227\/q70p-q449","volume-title":"IoT network intrusion dataset","author":"H. Kang","year":"2019","unstructured":"Kang, H., Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., and Kim, H.K., IoT network intrusion dataset, IEEE Dataport, 2019. \u00a0https:\/\/doi.org\/10.21227\/q70p-q449"},{"key":"7427_CR24","unstructured":"Scikit-learn: Machine learning in Python. https:\/\/scikit-learn.org\/stable\/. Cited November 30, 2020."},{"key":"7427_CR25","unstructured":"TensorFlow. www.tensorflow.org\/. Cited November 30, 2020."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080241.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080241","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080241.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:24Z","timestamp":1773612384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080241"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7427"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080241","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"20 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}