{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:28:41Z","timestamp":1777487321437,"version":"3.51.4"},"reference-count":20,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s014641162108040x","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1165-1174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning"],"prefix":"10.3103","volume":"55","author":[{"given":"M. O.","family":"Kalinin","sequence":"first","affiliation":[]},{"given":"V. M.","family":"Krundyshev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7451_CR1","unstructured":"DE-CIX. Highest jump ever: DE-CIX Frankfurt reaches 9.1 Tbps. https:\/\/www.de-cix.net\/en\/about-de-cix\/ news\/de-cix-frankfurt-reaches-9-1-tbps. Cited December 25, 2020."},{"key":"7451_CR2","unstructured":"Cisco VNI: by 2022 the annual Internet traffic in Russia will be three times higher. https:\/\/www.cisco.com\/ c\/ru_ru\/about\/press\/press-releases\/2018\/12-14.html. Cited December 25, 2020."},{"key":"7451_CR3","unstructured":"Nokia catalyzes the next chapter of the Internet; innovations deliver massive performance and heightened security needed for cloud and machine era. https:\/\/www.nokia.com\/about-us\/news\/releases\/2017\/06\/14\/nokia-catalyzes-the-next-chapter-of-the-internet-innovations-deliver-massive-performance-and-heightened-security-needed-for-cloud-and-machine-era\/. Cited December 25, 2020."},{"key":"7451_CR4","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1134\/S1064230720020124","volume":"59","author":"D.P. Zegzhda","year":"2020","unstructured":"Zegzhda, D.P., Lavrova, D.S., and Pavlenko, E.Yu., Management of a dynamic infrastructure of complex systems under conditions of directed cyber attacks, J. Comput. Syst. Sci. Int., 2020, vol. 59, no. 3, pp. 358\u2013370. \u00a0https:\/\/doi.org\/10.1134\/S1064230720020124","journal-title":"J. Comput. Syst. Sci. Int."},{"key":"7451_CR5","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, IEEE Industrial Cyber-Physical Systems (ICPS), St. Petersburg, 2018, IEEE, 2018, pp. 818\u2013823. \u00a0https:\/\/doi.org\/10.1109\/ICPHYS.2018.8390812","DOI":"10.1109\/ICPHYS.2018.8390812"},{"key":"7451_CR6","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for internet of things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability, London, 2019, IEEE, 2019, pp. 129\u2013135. \u00a0https:\/\/doi.org\/10.1109\/WorldS4.2019.8904022","DOI":"10.1109\/WorldS4.2019.8904022"},{"key":"7451_CR7","doi-asserted-by":"crossref","unstructured":"Kotenko, I.V., Saenko, I.B., Polubelova, O.V., and Chechulin, A.A., Application of security information and event management technology for information security in critical infrastructures, Tr. SPIIRAN, 2012, no. 20, pp. 27\u201356.","DOI":"10.15622\/sp.20.2"},{"key":"7451_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.3103\/S0146411620080155","volume":"54","author":"M.O. Kalinin","year":"2020","unstructured":"Kalinin, M.O., Krundyshev, V.M., and Sinyapkin, B.G., Development of the intrusion detection system for the Internet of Things based on sequence alignment algorithm, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp.\u00a0993\u20131000. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080155","journal-title":"Autom. Control Comput. Sci."},{"key":"7451_CR9","doi-asserted-by":"publisher","unstructured":"Noskov, A.N., Chechulin, A.A., and Tarasova, D.A., Investigation of heuristic approach to attacks on the telecommunications network detection based on data mining techniques, Tr.\u00a0SPIIRAN, 2014, no. 37, pp. 208\u2013224.\u00a0https:\/\/doi.org\/10.15622\/sp.37.13","DOI":"10.15622\/sp.37.13"},{"key":"7451_CR10","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Semyanov, P., Shtyrkina, A., and Zegzhda, P., Wavelet-analysis of network traffic time-series for detection of attacks on digital production infrastructure, SHS Web Conf., 2018, vol. 44, p. 00052. \u00a0https:\/\/doi.org\/10.1051\/shsconf\/20184400052","DOI":"10.1051\/shsconf\/20184400052"},{"key":"7451_CR11","doi-asserted-by":"publisher","first-page":"889","DOI":"10.3103\/S0146411619080194","volume":"53","author":"E. Malyshev","year":"2019","unstructured":"Malyshev, E., Moskvin, D., and Zegzhda, D., Application of an artificial neural network for detection of attacks in VANETs, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 889\u2013894.\u00a0https:\/\/doi.org\/10.3103\/S0146411619080194","journal-title":"Autom. Control Comput. Sci."},{"key":"7451_CR12","unstructured":"Zhukovsky, E.V. and Marshev, I.I., Detection of malicious executable files based on machine learning algorithms, Probl. Inf. Bezop. Komp\u2019yut. Sist., 2019, no. 1, pp. 89\u201399."},{"key":"7451_CR13","doi-asserted-by":"publisher","first-page":"050505","DOI":"10.1103\/PhysRevLett.109.050505","volume":"109","author":"N. Wiebe","year":"2012","unstructured":"Wiebe, N., Braun, D., and Lloyd, S., Quantum algorithm for data fitting, Phys. Rev. Lett., 2012, vol. 109, p. 050505. \u00a0https:\/\/doi.org\/10.1103\/PhysRevLett.109.050505","journal-title":"Phys. Rev. Lett."},{"key":"7451_CR14","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1016\/j.physleta.2011.08.002","volume":"375","author":"A. Bisio","year":"2011","unstructured":"Bisio, A., D\u2019Ariano, G.M., Perinotti, P., and Sedl\u00e1k, M., Quantum learning algorithms for quantum measurements, Phys. Lett. A, 2011, vol. 375, no. 39, pp. 3425\u20133434. \u00a0https:\/\/doi.org\/10.1016\/j.physleta.2011.08.002","journal-title":"Phys. Lett. A"},{"key":"7451_CR15","doi-asserted-by":"publisher","first-page":"140504","DOI":"10.1103\/PhysRevLett.114.140504","volume":"114","author":"L. Zhaokai","year":"2015","unstructured":"Zhaokai, L., Xiaomei, L., Nanyang, X., and Jiangfeng, D., Experimental realization of a quantum support vector machine, Phys. Rev. Lett., 2015, vol. 114, p. 140504. \u00a0https:\/\/doi.org\/10.1103\/PhysRevLett.114.140504","journal-title":"Phys. Rev. Lett."},{"key":"7451_CR16","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1038\/nature23474","volume":"549","author":"J. Biamonte","year":"2017","unstructured":"Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., and Lloyd, S., Quantum machine learning, Nature, 2017, vol. 549, pp. 195\u2013202. \u00a0https:\/\/doi.org\/10.1038\/nature23474","journal-title":"Nature"},{"key":"7451_CR17","doi-asserted-by":"publisher","DOI":"10.21227\/q70p-q449","volume-title":"Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., and Kim, H.K., IoT network intrusion dataset","author":"H. Kang","year":"2019","unstructured":"Kang, H. Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., and Kim, H.K., IoT network intrusion dataset, IEEE Dataport, 2019. \u00a0https:\/\/doi.org\/10.21227\/q70p-q449"},{"key":"7451_CR18","unstructured":"Parmisano, S., Garcia, M., and Erquiaga, M., Stratosphere laboratory. A labeled dataset with malicious and benign IoT network traffic. January 22th. https:\/\/www.stratosphereips.org\/datasets-iot23. Cited December 25, 2020."},{"key":"7451_CR19","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N. Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., and Turnbull, B., Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset, Future Gen. Comput. Syst., 2019, vol. 100, pp. 779\u2013796. \u00a0https:\/\/doi.org\/10.1016\/j.future.2019.05.041","journal-title":"Future Gen. Comput. Syst."},{"key":"7451_CR20","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/BF00994018","volume":"20","author":"C. Cortes","year":"1995","unstructured":"Cortes, C. and Vapnik, V., Support vector networks, Mach. Learn., 1995, vol. 20, pp. 273\u2013297. \u00a0https:\/\/doi.org\/10.1007\/BF00994018","journal-title":"Mach. Learn."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162108040X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162108040X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162108040X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:11Z","timestamp":1773612071000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162108040X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7451"],"URL":"https:\/\/doi.org\/10.3103\/s014641162108040x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"15 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}