{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:40Z","timestamp":1773615520674,"version":"3.50.1"},"reference-count":11,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080320","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1051-1060","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks"],"prefix":"10.3103","volume":"55","author":[{"given":"K. V.","family":"Vasil\u2019eva","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7434_CR1","doi-asserted-by":"publisher","first-page":"739","DOI":"10.3103\/S0146411616080265","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739\u2013742. https:\/\/doi.org\/10.3103\/S0146411616080265","journal-title":"Autom. Control Comput. Sci."},{"key":"7434_CR2","first-page":"194","volume":"17","author":"E.B. Aleksandrova","year":"2014","unstructured":"Aleksandrova, E.B., Vasilev, P.N., and Rezedinova, E.U., Extended dynamic revocable BBS group signature scheme, Nonlinear Phenom. Complex Syst. (Minsk, Belarus), 2014, vol. 17, no. 2, pp. 194\u2013202.","journal-title":"Nonlinear Phenom. Complex Syst. (Minsk, Belarus)"},{"key":"7434_CR3","unstructured":"Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., Moscow, 2019, Basarab, M. and Markov, A.S., Eds., Moscow: CEUR Workshop Proceedings, 2019, pp. 60\u201364."},{"key":"7434_CR4","unstructured":"Zhou, J., Xu, Z., Rush, A.M., and Yu, M., Automating botnet detection with graph neural networks, 2020. arXiv:2003.06344 [cs.CR]"},{"key":"7434_CR5","series-title":"Ranking attack graphs with graph neural networks","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00843-6_30","volume-title":"Information Security Practice and Experience. ISPEC 2009","author":"L. Lu","year":"2009","unstructured":"Lu, L., Safavi-Naini, R., Hagenbuchner, M., Susilo, W., Horton, J., Yong, S.L., and Tsoi, A.C., Ranking attack graphs with graph neural networks,  Information Security Practice and Experience. ISPEC 2009, Bao, F., Li, H., and Wang, G., Eds., Lecture Notes in Computer Science, vol. 5451, Berlin: Springer, 2009, pp. 345\u2013359. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-00843-6_30"},{"key":"7434_CR6","unstructured":"Drosou, A., et al., Cross-layer anomaly detection framework, Horizon 2020, Research and Innovation Programme. 20019. https:\/\/ec.europa.eu\/research\/participants\/documents\/downloadPublic?documentIds= 080166e5c5665c90&appId=PPGMS."},{"key":"7434_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z. Wu","year":"2020","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., and Yu, P.S., A comprehensive survey on graph neural networks, IEEE Trans. Neural Networks Learn. Syst., 2020, vol. 32, no. 1, pp. 4\u201324. https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"7434_CR8","unstructured":"Gilmer, J., Schoenholz, S.S., Riley, P.F., Vinyals, O., and Dahl, G.E., Neural message passing for quantum chemistry, Proc. Mach. Learn. Res., 2017, vol. 70, pp. 1263\u20131272. https:\/\/proceedings.mlr.press\/v70\/gilmer17a.html"},{"key":"7434_CR9","unstructured":"Wu, L., Sun, P., Hong, R., Fu, Y., Wang, X., and Wang, M., SocialGCN: An efficient graph convolutional network-based model for social recommendation, 2018. arXiv:1811.02815\u00a0[cs.IR]"},{"key":"7434_CR10","unstructured":"Defferrard, M., Bresson, X., and Vandergheynst, P., Convolutional neural networks on graphs with fast localized spectral filtering, Advances in Neural Information Processing Systems, Lee, D., Sugiyama, M., Luxburg, U., Guyon, I., and Garnett, R., Curran Associates, 2016, vol. 29. https:\/\/proceedings.neurips.cc\/paper\/2016\/file\/ 04df4d434d481c5bb723be1b6df1ee65-Paper.pdf"},{"key":"7434_CR11","unstructured":"Nour, M., New generations of Internet of Things datasets for cybersecurity applications based machine learning: TON_IoT Datasets, eResearch Australasia Conf., Brisbane, Australia, 2019, pp. 21\u201325."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080320.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080320","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080320.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:04Z","timestamp":1773612064000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7434"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080320","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"3 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}