{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:13Z","timestamp":1773615733156,"version":"3.50.1"},"reference-count":19,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700743","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:42Z","timestamp":1741962162000},"page":"1119-1131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation"],"prefix":"10.3103","volume":"58","author":[{"given":"E. Yu.","family":"Pavlenko","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7773_CR1","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.3103\/s0146411623080229","volume":"57","author":"E.Yu. Pavlenko","year":"2023","unstructured":"Pavlenko, E.Yu., Analysis and forecasting of states of industrial networks with adaptive topology based on network motifs, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 1084\u20131095. https:\/\/doi.org\/10.3103\/s0146411623080229","journal-title":"Autom. Control Comput. Sci."},{"key":"7773_CR2","first-page":"284","volume":"17","author":"V.V. Platonov","year":"2014","unstructured":"Platonov, V.V. and Semenov, P.O., Dimension reduction in network attacks detection systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 284\u2013289.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7773_CR3","doi-asserted-by":"publisher","unstructured":"Pavlenko, E.Yu., Study of the effect of attacks on structural and parametric metrics of networks with adaptive topology, Voprosy Kiberbezopasnosti, 2023, no. 4, pp. 65\u201371. https:\/\/doi.org\/10.21681\/2311-3456-2023-4-65-71","DOI":"10.21681\/2311-3456-2023-4-65-71"},{"key":"7773_CR4","first-page":"194","volume":"17","author":"E.B. Aleksandrova","year":"2014","unstructured":"Aleksandrova, E.B., Vasilev, P.N., and Rezedinova, E.U., Extended dynamic revocable BBS group signature scheme, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 2, pp. 194\u2013202.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7773_CR5","doi-asserted-by":"publisher","first-page":"850","DOI":"10.3103\/s014641162008009x","volume":"54","author":"A.G. Busygin","year":"2020","unstructured":"Busygin, A.G. and Konoplev, A.S., Blockchain based system model for assessment of security against threats caused by uneven distribution of computational power, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp.\u00a0850\u2013853. https:\/\/doi.org\/10.3103\/s014641162008009x","journal-title":"Autom. Control Comput. Sci."},{"key":"7773_CR6","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.3103\/s0146411622080168","volume":"56","author":"E.Yu. Pavlenko","year":"2022","unstructured":"Pavlenko, E.Yu., Functional model of adaptive network topology of large-scale systems based on dynamical graph theory, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 1016\u20131024. https:\/\/doi.org\/10.3103\/s0146411622080168","journal-title":"Autom. Control Comput. Sci."},{"key":"7773_CR7","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Ensuring the sustainability of cyberphysical systems functioning based on dynamic reconfiguration, Problemy Informatsionnoi Bezopasnosti. Komp\u2019yuternye Sistemy, 2018, no. 4, pp. 130\u2013139."},{"key":"7773_CR8","doi-asserted-by":"publisher","first-page":"340558","DOI":"10.1016\/j.aca.2022.340558","volume":"1244","author":"H. Zhan","year":"2023","unstructured":"Zhan, H., Zhu, X., Qiao, Zh., and Hu, J., Graph neural tree: A novel and interpretable deep learning-based framework for accurate molecular property predictions, Anal. Chim. Acta, 2023, vol. 1244, p. 340558. https:\/\/doi.org\/10.1016\/j.aca.2022.340558","journal-title":"Anal. Chim. Acta"},{"key":"7773_CR9","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.3103\/s0146411622080168","volume":"56","author":"E.Yu. Pavlenko","year":"2022","unstructured":"Pavlenko, E.Yu., Functional model of adaptive network topology of large-scale systems based on dynamical graph theory, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 1016\u20131024. https:\/\/doi.org\/10.3103\/s0146411622080168","journal-title":"Autom. Control Comput. Sci."},{"key":"7773_CR10","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.3103\/s0146411618080175","volume":"52","author":"A.S. Konoplev","year":"2018","unstructured":"Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017\u20131021. https:\/\/doi.org\/10.3103\/s0146411618080175","journal-title":"Autom. Control Comput. Sci."},{"key":"7773_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.patrec.2020.12.016","volume":"143","author":"H. Fu","year":"2021","unstructured":"Fu, H. and Wang, H., Self-attention binary neural tree for video summarization, Pattern Recognit. Lett., 2021, vol. 143, pp. 19\u201326. https:\/\/doi.org\/10.1016\/j.patrec.2020.12.016","journal-title":"Pattern Recognit. Lett."},{"key":"7773_CR12","doi-asserted-by":"publisher","unstructured":"Lavrova, D., Poltavtseva, M., Shtyrkina, A., and Zegzhda, P., Detection of cyber threats to network infrastructure of digital production based on the methods of big data and multifractal analysis of traffic, SHS Web of Conferences, 2018, vol. 44, no. 7, p. 00051. https:\/\/doi.org\/10.1051\/shsconf\/20184400051","DOI":"10.1051\/shsconf\/20184400051"},{"key":"7773_CR13","doi-asserted-by":"publisher","first-page":"176","DOI":"10.5465\/ambpp.1985.4979014","volume":"1985","author":"D. Krackhardt","year":"1985","unstructured":"Krackhardt, D. and Stern, R.N., The design of social networks and the management of crises, Academy of Management Proceedings, 1985, vol. 1985, no. 1, pp. 176\u2013180. https:\/\/doi.org\/10.5465\/ambpp.1985.4979014","journal-title":"Academy of Management Proceedings"},{"key":"7773_CR14","doi-asserted-by":"crossref","unstructured":"Bykova, V.V., Measures for graph integrity: A comparative survey, Prikl. Diskretnaya Mat., 2014, no. 4, pp. 96\u2013111.","DOI":"10.17223\/20710410\/26\/11"},{"key":"7773_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.7151\/dmgt.1508","volume":"30","author":"E. Delavina","year":"2010","unstructured":"Delavina, E., Pepper, R., and Waller, B., Lower bounds for the domination number, Discussiones Math. Graph Theory, 2010, vol. 30, no. 3, pp. 475\u2013487. https:\/\/doi.org\/10.7151\/dmgt.1508","journal-title":"Discussiones Math. Graph Theory"},{"key":"7773_CR16","doi-asserted-by":"publisher","first-page":"864","DOI":"10.3103\/s0146411620080362","volume":"54","author":"P.D. Zegzhda","year":"2020","unstructured":"Zegzhda, P.D., Anisimov, V.G., Sem\u2019yanov, P.V., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los\u2019, V.P., Approach to the evaluation of the efficiency of information security in control systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 864\u2013870. https:\/\/doi.org\/10.3103\/s0146411620080362","journal-title":"Autom. Control Comput. Sci."},{"key":"7773_CR17","doi-asserted-by":"publisher","unstructured":"Bykova, V.V. and Kirillov, Yu.I., Calculation of upper bounds for graph vertex integrity based on the minimal separators, Prikladnaya Diskretnaya Matematika. Prilozhenie, 2015, no. 8, pp. 142\u2013144. https:\/\/doi.org\/10.17223\/2226308X\/8\/55","DOI":"10.17223\/2226308X\/8\/55"},{"key":"7773_CR18","unstructured":"Pavlenko, E.Yu., Identification of structural and parametric metrics sensitive to attacks on dynamic networks, Materialy 32-i Nauchno-tekhnicheskoi konferentsii. Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii (Proceedings of the 32th Scientific and Technical Conference: Methods and Technical Means of Ensuring Information Security), St. Petersburg: Izdatel\u2019stvo Politekhnicheskogo Universiteta, 2023, pp. 41\u201343."},{"key":"7773_CR19","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.3103\/s0146411623080151","volume":"57","author":"D.S. Lavrova","year":"2023","unstructured":"Lavrova, D.S., Bogina, V.M., Zegzhda, D.P., and Pavlenko, E.Yu., Probabilistic approach to estimate the cyber resistance of mobile networks based on their connectivity, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp.\u00a01103\u20131115. https:\/\/doi.org\/10.3103\/s0146411623080151","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700743.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700743","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700743.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:52Z","timestamp":1773612232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7773"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700743","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"20 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author of this work declares that he has no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}