{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:49Z","timestamp":1773615589535,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080253","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1104-1110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks"],"prefix":"10.3103","volume":"55","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"V. A.","family":"Nikulkin","sequence":"additional","affiliation":[]},{"given":"D. A.","family":"Moskvin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7441_CR1","unstructured":"Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., and Zhou, Y., Understanding the Mirai botnet, 26th USENIX Security Symp., Vancouver, 2017, Vancouver: USENIX Assoc., 2017, pp. 1093\u20131110."},{"key":"7441_CR2","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Generative adversarial network for detecting cyber threats in industrial systems, Proceeding of International Scientific Conference on Telecommunications, Computing and Control, Voinov, N., Schreck, T., and Khan, S., Eds., Smart Innovation, Systems and Technologies, vol. 220, Singapore: Springer, 2021, pp. 1\u201313. \u00a0https:\/\/doi.org\/10.1007\/978-981-33-6632-9_1","DOI":"10.1007\/978-981-33-6632-9_1"},{"key":"7441_CR3","doi-asserted-by":"publisher","first-page":"745","DOI":"10.3103\/S0146411615080118","volume":"49","author":"D.A. Moskvin","year":"2015","unstructured":"Moskvin, D.A. and Ivanov, D.V., Methods of protecting self-organizing networks against attacks on traffic routing, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 745\u2013750. \u00a0https:\/\/doi.org\/10.3103\/S0146411615080118","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR4","doi-asserted-by":"publisher","first-page":"336","DOI":"10.33581\/1561-4085-2019-22-4-336-341","volume":"22","author":"D.V. Ivanov","year":"2019","unstructured":"Ivanov, D.V. and Moskvin, D.A., Application of fractal methods to ensure the cyber-resilience of self-organizing networks, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2019, vol. 22, no. 4, pp. 336\u2013341. \u00a0https:\/\/doi.org\/10.33581\/1561-4085-2019-22-4-336-341","journal-title":"Nonlinear Phenom. Complex Syst. (Minsk, Belarus)"},{"key":"7441_CR5","doi-asserted-by":"publisher","unstructured":"Cho, H., Lim, S., Kalinin, M., Krundyshev, V., Belenko, V., and Chernenko, V., Genetic sequence alignment computing for ensuring cyber security of the IoT systems, Sustainable Intelligent Systems, Joshi, A., Nagar, A.K., Mar\u00edn-Ravent\u00f3s, G., Eds., Advances in Sustainability Science and Technology, Singapore: Springer, 2021, pp. 235\u2013252. \u00a0https:\/\/doi.org\/10.1007\/978-981-33-4901-8_14","DOI":"10.1007\/978-981-33-4901-8_14"},{"key":"7441_CR6","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.3103\/S0146411619080212","volume":"53","author":"R.A. Ognev","year":"2019","unstructured":"Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no.\u00a08, pp. 1045\u20131055. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080212","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR7","unstructured":"Zhukovskiy, E.V. and Zegzhda, D.P., Analysis of malware with dangerous trigger-based behavior, Zashchita Inf. Insaid, 2019, no. 3, pp. 60\u201363."},{"key":"7441_CR8","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for internet of things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129\u2013135. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904022","DOI":"10.1109\/WorldS4.2019.8904022"},{"key":"7441_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.33581\/1561-4085-2020-23-4-397-404","volume":"23","author":"M. Kalinin","year":"2020","unstructured":"Kalinin, M. and Krundyshev, V., Sequence alignment algorithms for intrusion detection in the Internet of Things, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2020, vol. 23, no. 4, pp. 397\u2013404. https:\/\/doi.org\/10.33581\/1561-4085-2020-23-4-397-404","journal-title":"Nonlinear Phenom. Complex Syst. (Minsk, Belarus)"},{"key":"7441_CR10","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, 2018, New York: Association for Computing Machinery, 2018, p. 9. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7441_CR11","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.3103\/S0146411618080175","volume":"52","author":"A.S. Konoplev","year":"2018","unstructured":"Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017\u20131021. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080175","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR12","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.3103\/S0146411618080059","volume":"52","author":"A.G. Busygin","year":"2018","unstructured":"Busygin, A.G., Konoplev, A.S., and Zegzhda, D.P., Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a01080\u20131083. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080059","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR13","unstructured":"Busygin, A.G. and Kalinin, M.O., Approach to protection of blockchain systems against threats caused by uneven distribution of computational power, 17th St. Petersburg, Int. Conf. Regional Informatics (RI-2020), St. Petersburg, 2020, St. Petersburg: SPOISU, 2020, pp. 121\u2013122."},{"key":"7441_CR14","doi-asserted-by":"publisher","first-page":"947","DOI":"10.3103\/S014641161708003X","volume":"51","author":"E.B. Aleksandrova","year":"2017","unstructured":"Aleksandrova, E.B., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947\u2013958. \u00a0https:\/\/doi.org\/10.3103\/S014641161708003X","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR15","doi-asserted-by":"publisher","first-page":"739","DOI":"10.3103\/S0146411616080265","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739\u2013742. \u00a0https:\/\/doi.org\/10.3103\/S0146411616080265","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR16","doi-asserted-by":"publisher","first-page":"888","DOI":"10.3103\/S0146411620080039","volume":"54","author":"E.B. Aleksandrova","year":"2020","unstructured":"Aleksandrova, E.B., Rekhviashvili, I. Sh., and Yarmak, A.V., Lattice-based ring signature with linking-based revocation for industrial Internet of Things, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 888\u2013895. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080039","journal-title":"Autom. Control Comput. Sci."},{"key":"7441_CR17","doi-asserted-by":"publisher","unstructured":"Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 81\u201385. \u00a0https:\/\/doi.org\/10.1109\/WorldS450073.2020.9210421","DOI":"10.1109\/WorldS450073.2020.9210421"},{"key":"7441_CR18","series-title":"Pulse: an adaptive intrusion detection for the internet of things","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2018.0035","volume-title":"Living in the Internet of Things: Cybersecurity of the IoT, London","author":"E. Anthi","year":"2018","unstructured":"Anthi, E., Williams, L., and Burnap, P., Pulse: an adaptive intrusion detection for the internet of things,  Living in the Internet of Things: Cybersecurity of the IoT, London, 2018, London: IET Digital Library, 2018. \u00a0https:\/\/doi.org\/10.1049\/cp.2018.0035"},{"key":"7441_CR19","doi-asserted-by":"publisher","unstructured":"Sabatucci, L., Seidita, V., and Cossentino, M., The four types of self-adaptive systems: A metamodel, Intelligent Interactive Multimedia Systems and Services 2017. KES-IIMSS-18 2018, De Pietro, G., Gallo, L, Howlett, R., and Jain, L., Eds., Smart Innovation, Systems and Technologies, vol. 76, Cham: Springer, 2018, pp. 440\u2013450. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-59480-4_44","DOI":"10.1007\/978-3-319-59480-4_44"},{"key":"7441_CR20","volume-title":"XMPP: The Definitive Guide","author":"P. Saint-Andre","year":"2009","unstructured":"Saint-Andre, P., Smith, K., and Tronon, R., XMPP: The Definitive Guide, O\u2019Reilly Media, 2009."},{"key":"7441_CR21","unstructured":"Yl\u00f6nen, T., SSH-secure login connections over the Internet, Proc. 6th Conf. on USENIX Security Symp., Focusing on Applications of Cryptography, San Jose, Calif., 1996, Berkeley, Calif.: USENIX Association, 1996, vol. 6, p. 4."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080253.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080253","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080253.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:56Z","timestamp":1773612116000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7441"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080253","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"30 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}