{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:22Z","timestamp":1773615802905,"version":"3.50.1"},"reference-count":8,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080411","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1209-1214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis"],"prefix":"10.3103","volume":"55","author":[{"given":"V. S.","family":"Nefedov","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Kriulin","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Eremeev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7457_CR1","unstructured":"OrNetRadar. https:\/\/nusenu.github.io\/OrNetRadar. Cited May 15, 2020."},{"key":"7457_CR2","unstructured":"Specification of Tor protocol: Official website. https:\/\/gitweb.torproject.org\/torspec.git. Cited May 15, 2020."},{"key":"7457_CR3","unstructured":"Chakravarty, S., Traffic analysis attacks and defenses in low latency anonymous communications, PhD Thesis, New York: Columbia University, 2014."},{"key":"7457_CR4","unstructured":"Dingledine, R., Mathewson, N., and Syverson, P., Tor: The second-generation onion router, Onion Router. http:\/\/www.onion-router.net\/Publications\/tor-desingn.pdf. Cited May 15, 2020."},{"key":"7457_CR5","unstructured":"Collection of characteristics of nodes of Tor network. http:\/\/collector.torproject.org. Cited May, 2020."},{"key":"7457_CR6","unstructured":"Eremeev, M.A., Nefedov, V.S., Ostrovsky, A.S., and Semchenkov, D.A., Approach to detect DNS-based covert channels by identifying beacon signals, Probl. Inf. Bezop. Komp\u2019yut. Sist., 2020, no. 3, pp. 40\u201349."},{"key":"7457_CR7","doi-asserted-by":"publisher","first-page":"944","DOI":"10.3103\/S0146411620080192","volume":"54","author":"I.T. Latypov","year":"2020","unstructured":"Latypov, I.T. and Eremeev, M.A., Multilevel model of computer attack based on attributive metagraphs, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 944\u2013948. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080192","journal-title":"Autom. Control Comput. Sci."},{"key":"7457_CR8","doi-asserted-by":"publisher","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, Proc. 10th Int. Conf. on Security of Information and Networks, Jaipur, India, 2017, New York: Association for Computing Machinery, 2017, pp. 295\u2013298. \u00a0https:\/\/doi.org\/10.1145\/3136825.3136857","DOI":"10.1145\/3136825.3136857"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080411.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080411","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080411.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:50Z","timestamp":1773612290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":8,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7457"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080411","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"12 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}