{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:18Z","timestamp":1773615738208,"version":"3.50.1"},"reference-count":14,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080114","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"1040-1046","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory"],"prefix":"10.3103","volume":"57","author":[{"given":"V. M.","family":"Krundyshev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. A.","family":"Markov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P. V.","family":"Semyanov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. G.","family":"Busygin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7666_CR1","doi-asserted-by":"publisher","unstructured":"Cho, H., Andreev, A., Kalinin, M., Moskvin, D., and Zegzhda, D., Mismatch-resistant intrusion detection with bioinspired suffix tree algorithm, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 1\u201316. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_1","DOI":"10.1007\/978-3-030-93872-7_1"},{"key":"7666_CR2","unstructured":"Petrenko, S.A., Petrenko, A.A., and Kostyukov, A.D., Cyber resilience of digital ecosystems, Zashch. Inf. Insaid, 2021, no. 4, pp. 17\u201323."},{"key":"7666_CR3","unstructured":"Fatin, A.D. and Pavlenko, E.Yu., Protection against network attacks on cyberphysical systems based on neuroevolution algorithms, Informatsionnaya bezopasnost\u2019 regionov Rossii (IBRR-2021). Materialy XII Sankt-Peterburgskoi mezhregional'noi konferentsii (Information Security of Russian Regions: Proc. 12th St. Petersburg Interregional Conf.), Sovetov, B.Ya., Yusupov, R.M. and Kasatkin, V.V., Eds., St. Petersburg, 2021, pp. 345\u2013346."},{"key":"7666_CR4","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.3103\/s0146411621080253","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Nikulkin, V.A., and Moskvin, D.A., Applying honeypot technology with adaptive behavior to internet-of-things networks, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1104\u20131110. https:\/\/doi.org\/10.3103\/s0146411621080253","journal-title":"Autom. Control Comput. Sci."},{"key":"7666_CR5","volume-title":"On Intelligence","author":"J. Hawkins","year":"2004","unstructured":"Hawkins, J. and Blakeslee, S., On Intelligence, New York: Times Books, 2004."},{"key":"7666_CR6","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Prevention of cyber attacks in smart manufacturing applying modern neural network methods, IOP Conf. Ser.: Mater. Sci. Eng., 2020, vol. 940, no. 1, p. 012011. https:\/\/doi.org\/10.1088\/1757-899x\/940\/1\/012011","DOI":"10.1088\/1757-899x\/940\/1\/012011"},{"key":"7666_CR7","unstructured":"Problems that fit htm, Numenta, Tech. Rep., 2006."},{"key":"7666_CR8","unstructured":"Hawkins, J., Hierarchical temporal memory including cortical learning algorithms. Technical report, Numenta, Inc. Ver. 0.2.1, 2011."},{"key":"7666_CR9","doi-asserted-by":"publisher","unstructured":"Moustafa, N. and Slay, J., UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set), 2015 \n               Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2015, IEEE, 2015, pp. 1\u20136. https:\/\/doi.org\/10.1109\/milcis.2015.7348942","DOI":"10.1109\/milcis.2015.7348942"},{"key":"7666_CR10","doi-asserted-by":"publisher","unstructured":"Belenko, V., Krundyshev, V., and Kalinin, M., Synthetic datasets generation for intrusion detection in VANET, Proc. 11th Int. Conf. on Security of Information and Networks, Cardiff, UK, 2018, New York: Association for Computing Machinery, 2018, p. 9. https:\/\/doi.org\/10.1145\/3264437.3264479","DOI":"10.1145\/3264437.3264479"},{"key":"7666_CR11","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S. Ahmad","year":"2017","unstructured":"Ahmad, S., Lavin, A., Purdy, S., and Agha, Z., Unsupervised real-time anomaly detection for streaming data, Neurocomputing, 2017, vol. 262, pp. 134\u2013147. https:\/\/doi.org\/10.1016\/j.neucom.2017.04.070","journal-title":"Neurocomputing"},{"key":"7666_CR12","unstructured":"Singh, A., Anomaly detection for temporal data using long short-term memory (LSTM), MSc Thesis, Stockholm: KTH Royal Institute of Technology, 2017."},{"key":"7666_CR13","doi-asserted-by":"publisher","first-page":"2474","DOI":"10.1162\/neco_a_00893","volume":"28","author":"Yu. Cui","year":"2016","unstructured":"Cui, Yu., Ahmad, S., and Hawkins, J., Continuous online sequence learning with an unsupervised neural network model, Neural Comput., 2016, vol. 28, no. 11, pp. 2474\u20132504. https:\/\/doi.org\/10.1162\/neco_a_00893","journal-title":"Neural Comput."},{"key":"7666_CR14","volume-title":"Unsupervised anomaly detection in time series with recurrent neural networks, Student Thesis","author":"J. Haddad","year":"2019","unstructured":"Haddad, J. and Piehl, C., Unsupervised anomaly detection in time series with recurrent neural networks, Student Thesis, Stockholm: KTH Royal Institute of Technology, 2019. https:\/\/urn.kb.se\/resolve?urn=urn%3Anbn% 3Ase%3Akth%3Adiva-259655."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080114.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080114","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080114.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:55Z","timestamp":1773612235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":14,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7666"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080114","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"30 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}