{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:24Z","timestamp":1773615624255,"version":"3.50.1"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080319","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1136-1141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices"],"prefix":"10.3103","volume":"55","author":[{"given":"M. E.","family":"Sukhoparov","sequence":"first","affiliation":[]},{"given":"I. S.","family":"Lebedev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7446_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TDSC.2008.39","volume":"6","author":"D. Gao","year":"2009","unstructured":"Gao, D., Reiter, M., and Song, D., Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance, IEEE Trans. Dependable Secure Comput., 2009, vol. 6, no. 2, pp. 96\u2013110. \u00a0https:\/\/doi.org\/10.1109\/TDSC.2008.39","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7446_CR2","doi-asserted-by":"publisher","unstructured":"Devesh, M., Kant, A.K., Suchit, Y.R., Tanuja, P. and Kumar, S.N., Fruition of CPS and IoT in context of Industry 4.0, Intelligent Communication, Control and Devices, Choudhury, S., Mishra, R., Mishra, R.G., and Kumar, A., Eds., Advances in Intelligent Systems and Computing, vol. 989, Singapore: Springer, 2020, pp. 367\u2013375. https:\/\/doi.org\/10.1007\/978-981-13-8618-3_39","DOI":"10.1007\/978-981-13-8618-3_39"},{"key":"7446_CR3","first-page":"19","volume":"1","author":"O.S. Amosov","year":"2017","unstructured":"Amosov, O.S., Magola, D.S., and Baena, S.G., Network classification of information security attacks based on intelligent technologies, fractal and wavelet analysis, Uch. Zap. Komsomol\u2019skogo-Na-Amure Gos. \n               Tekh. Univ., 2017, vol. 1, no. 4, pp. 19\u201329.","journal-title":"Tekh. Univ."},{"key":"7446_CR4","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/S0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7446_CR5","doi-asserted-by":"publisher","first-page":"971","DOI":"10.3103\/S0146411618080084","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971\u2013976. \u00a0https:\/\/doi.org\/10.3103\/S0146411618080084","journal-title":"Autom. Control Comput. Sci."},{"key":"7446_CR6","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Predicting cyber attacks on industrial systems using the kalman filter, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 317\u2013321. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904038","DOI":"10.1109\/WorldS4.2019.8904038"},{"key":"7446_CR7","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Zegzhda, D., and Yarmak, A., Using GRU neural network for cyber-attack detection in automated process control systems, IEEE Int. Black Sea Conf. on Communications and Networking (BlackSeaCom), Sochi, Russia, 2019, IEEE, 2019, pp.\u00a01\u20133. \u00a0https:\/\/doi.org\/10.1109\/BlackSeaCom.2019.8812818","DOI":"10.1109\/BlackSeaCom.2019.8812818"},{"key":"7446_CR8","unstructured":"Lavrova, D. and Zaitceva, E., and Zegzhda, P., Bio-inspired approach to self-regulation for industrial dynamic network infrastructure, CEUR Workshop Proc., Moscow, 2019, Basarab,\u00a0M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 34\u201339."},{"key":"7446_CR9","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1088\/0022-3727\/14\/3\/007","volume":"14","author":"M.K. Bevir","year":"1981","unstructured":"Bevir, M.K., O\u2019Sullivan, V.T., and Wyatt, D.G., Computation of electromagnetic flowmeter characteristics from magnetic field data, J. Phys. D.: Appl. Phys., 1981, vol. 14, no. 3, pp. 373\u2013388. \u00a0https:\/\/doi.org\/10.1088\/0022-3727\/14\/3\/007","journal-title":"J. Phys. D.: Appl. Phys."},{"key":"7446_CR10","series-title":"Application of an autonomous object behavior model to classify the cybersecurity state","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30859-9_9","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2019, ruSMART 2019","author":"V.V. Semenov","year":"2019","unstructured":"Semenov, V.V., Lebedev, I.S., Sukhoparov, M.E., and Salakhutdinova, K.I., Application of an autonomous object behavior model to classify the cybersecurity state,  Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2019, ruSMART 2019, Galinina, O., Andreev, S., Balandin, S., and Koucheryavy, Y., Eds., Lecture Notes in Computer Science, vol. 11660, Cham: Springer, 2019, pp. 104\u2013112. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-30859-9_9"},{"key":"7446_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.14529\/ctcr160302","volume":"16","author":"I.L. Kaftannikov","year":"2016","unstructured":"Kaftannikov, I.L. and Parasich, A.V., Problems of training set\u2019s formation in machine learning tasks, Vestn. Yuzhno-Ural. Gos. Univ. Ser.: Komp\u2019yut. Tekhnol., Upr., \n               Radioelektron., 2016, vol. 16, no. 3, pp. 15\u201324. \u00a0https:\/\/doi.org\/10.14529\/ctcr160302","journal-title":"Radioelektron."},{"key":"7446_CR12","doi-asserted-by":"publisher","unstructured":"Xiao, T., Xia, T., Yang, Y., Huang, C., and Wang, X., Learning from massive noisy labeled data for image classification, IEEE Conf. on Computer Vision and Pattern Recognition (CVPR), Boston, 2015, IEEE, 2015, pp. 2691\u20132699. \u00a0https:\/\/doi.org\/10.1109\/CVPR.2015.7298885","DOI":"10.1109\/CVPR.2015.7298885"},{"key":"7446_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G. Tsoumakas","year":"2007","unstructured":"Tsoumakas, G. and Katakis, I., Multi-label classification: An overview, Int. J. Data Warehousing Mining, 2007, vol. 3, no. 3, pp. 1\u201313. https:\/\/doi.org\/10.4018\/jdwm.2007070101","journal-title":"Int. J. Data Warehousing Mining"},{"key":"7446_CR14","first-page":"72","volume":"13","author":"V.V. Semenov","year":"2018","unstructured":"Semenov, V.V., Lebedev, I.S., and Sukhoparov, M.E., Identification of the state of individual elements of cyber-physical systems based on external behavioral characteristics, J.\u00a0Appl. Inf., 2018, vol. 13, no. 5, pp. 72\u201383.","journal-title":"J.\u00a0Appl. Inf."},{"key":"7446_CR15","doi-asserted-by":"publisher","unstructured":"Sukhoparov, M.E. and Lebedev, I.S., Identification the information security status for the Internet of Things devices in information and telecommunication systems, Sist. Upr., Svyazi Bezop., 2020, no. 3, pp. 252\u2013268. https:\/\/doi.org\/10.24411\/2410-9916-2020-10310","DOI":"10.24411\/2410-9916-2020-10310"},{"key":"7446_CR16","doi-asserted-by":"publisher","first-page":"44","DOI":"10.18721\/JCSTCS.13304","volume":"13","author":"M.E. Sukhoparov","year":"2020","unstructured":"Sukhoparov, M.E., Lebedev, I.S., and Garanin, A.V., Application of classifier sequences in the task of state analysis of Internet of Things devices, Telekommun. Sist. Komp\u2019yut. Seti, 2020, vol. 13, no. 3, pp. 44\u201354. \u00a0https:\/\/doi.org\/10.18721\/JCSTCS.13304","journal-title":"Telekommun. Sist. Komp\u2019yut. Seti"},{"key":"7446_CR17","unstructured":"Voroncov, K.V., Lectures on Algorithmic Compositions. http:\/\/www.machinelearning.ru\/wiki\/images\/0\/0d\/Voron-ML-Compositions.pdf. Cited April 8, 2021."},{"key":"7446_CR18","unstructured":"D\u2019yakonov, A., Methods for solving classification problems with categorical features, in Prikladnaya matematika i informatika (Applied Mathematics and Informatics), Moscow: MAKS Press, 2014, pp. 103\u2013127."},{"key":"7446_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/b12207","volume-title":"Ensemble Methods: Foundations and Algorithms","author":"Z.-H. Zhou","year":"2012","unstructured":"Zhou, Z.-H., Ensemble Methods: Foundations and Algorithms, New York: Chapman & Hall\/CRC, 2012."},{"key":"7446_CR20","doi-asserted-by":"publisher","unstructured":"Yu, Y., Zhou, Z.-H., and Ting, K.M., Cocktail ensemble for regression, Seventh IEEE Int. Conf. on Data Mining (ICDM 2007), Omaha, Neb., 2007, IEEE, 2007, pp. 721\u2013726. \u00a0https:\/\/doi.org\/10.1109\/ICDM.2007.60","DOI":"10.1109\/ICDM.2007.60"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080319.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080319","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080319.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:25Z","timestamp":1773612145000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080319"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7446"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080319","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"14 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}